rusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:38 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 02:18:38 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:38 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:38 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) r2 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='selinux\x00', 0xfffffffffffffff9) keyctl$update(0x2, r2, &(0x7f0000000280)="8552f934dbc2c1508504ab9999b41bb2639f88ae60a26d3b019a06d40dff8bf89786189c622c913d1c7726520a9c64cd5191771dd6b1a0453591661474bb3a53f6b2303d7ff33a9be3e28d8e3ec0f34c11ce1bc5bea423537bb56ca3a976e27716cc0a8418ff1fab6b969e8d5c1e444cd0536d5848209c564d4acdaab05f43d09fa4cefb1cc2cb3b97ae194f34b16bc1a42a8a348f035ebdd5e633c3003b1279e20750d77a288cfcf424fdc013e6c0678fe87113e7e84ef2", 0xb8) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 2343.323389][T23027] IPVS: ftp: loaded support on port[0] = 21 [ 2343.715674][T23027] chnl_net:caif_netlink_parms(): no params data found [ 2343.742650][T23027] bridge0: port 1(bridge_slave_0) entered blocking state [ 2343.753405][T23027] bridge0: port 1(bridge_slave_0) entered disabled state [ 2343.761423][T23027] device bridge_slave_0 entered promiscuous mode [ 2343.769832][T23027] bridge0: port 2(bridge_slave_1) entered blocking state [ 2343.776953][T23027] bridge0: port 2(bridge_slave_1) entered disabled state [ 2343.784866][T23027] device bridge_slave_1 entered promiscuous mode [ 2343.953974][T23027] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2343.964095][T23027] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2343.990949][T23027] team0: Port device team_slave_0 added [ 2344.155152][T23027] team0: Port device team_slave_1 added [ 2344.210052][T23027] device hsr_slave_0 entered promiscuous mode [ 2344.277819][T23027] device hsr_slave_1 entered promiscuous mode [ 2344.337281][T23027] bridge0: port 2(bridge_slave_1) entered blocking state [ 2344.344443][T23027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2344.351866][T23027] bridge0: port 1(bridge_slave_0) entered blocking state [ 2344.358975][T23027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2344.527603][T23048] IPVS: ftp: loaded support on port[0] = 21 [ 2344.533721][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2344.543445][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2344.944963][T23048] chnl_net:caif_netlink_parms(): no params data found [ 2344.963393][T15265] device bridge_slave_1 left promiscuous mode [ 2344.970224][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2345.018348][T15265] device bridge_slave_0 left promiscuous mode [ 2345.024583][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2345.089754][T15265] device bridge_slave_1 left promiscuous mode [ 2345.095959][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2345.158312][T15265] device bridge_slave_0 left promiscuous mode [ 2345.164461][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2345.218901][T15265] device bridge_slave_1 left promiscuous mode [ 2345.225066][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2345.278213][T15265] device bridge_slave_0 left promiscuous mode [ 2345.284351][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2349.570619][T15265] device hsr_slave_1 left promiscuous mode [ 2349.641852][T15265] device hsr_slave_0 left promiscuous mode [ 2349.701891][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2349.714119][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2349.724921][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2349.783500][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2349.869400][T15265] bond0 (unregistering): Released all slaves [ 2350.000715][T15265] device hsr_slave_1 left promiscuous mode [ 2350.064243][T15265] device hsr_slave_0 left promiscuous mode [ 2350.122514][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2350.133877][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2350.144807][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2350.181757][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2350.260079][T15265] bond0 (unregistering): Released all slaves [ 2350.439825][T15265] device hsr_slave_1 left promiscuous mode [ 2350.492963][T15265] device hsr_slave_0 left promiscuous mode [ 2350.552213][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2350.563684][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2350.575938][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2350.615285][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2350.707051][T15265] bond0 (unregistering): Released all slaves [ 2350.845824][T23048] bridge0: port 1(bridge_slave_0) entered blocking state [ 2350.854287][T23048] bridge0: port 1(bridge_slave_0) entered disabled state [ 2350.862818][T23048] device bridge_slave_0 entered promiscuous mode [ 2350.871282][T23048] bridge0: port 2(bridge_slave_1) entered blocking state [ 2350.880468][T23048] bridge0: port 2(bridge_slave_1) entered disabled state [ 2350.888394][T23048] device bridge_slave_1 entered promiscuous mode [ 2350.912172][T23027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2350.928920][T23048] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2350.938095][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2350.945958][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2350.956979][T23027] 8021q: adding VLAN 0 to HW filter on device team0 [ 2350.966468][T23048] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2350.978255][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2350.987066][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2350.995903][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2351.003030][T17975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2351.030771][T23048] team0: Port device team_slave_0 added [ 2351.038446][T23048] team0: Port device team_slave_1 added [ 2351.059327][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2351.068132][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2351.076537][T22123] bridge0: port 2(bridge_slave_1) entered blocking state [ 2351.083628][T22123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2351.150225][T23048] device hsr_slave_0 entered promiscuous mode [ 2351.188019][T23048] device hsr_slave_1 entered promiscuous mode [ 2351.230917][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2351.239818][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2351.248706][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2351.257169][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2351.266335][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2351.275105][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2351.283828][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2351.292186][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2351.300840][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2351.311735][T23027] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2351.323348][T23027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2351.337955][T12621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2351.346471][T12621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2351.378051][T23027] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2351.424962][T23048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2351.440160][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2351.449265][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2351.460932][T23048] 8021q: adding VLAN 0 to HW filter on device team0 [ 2351.476203][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2351.500647][T22000] bridge0: port 1(bridge_slave_0) entered blocking state [ 2351.509895][T22000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2351.533491][T12621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2351.542522][T12621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2351.552524][T12621] bridge0: port 2(bridge_slave_1) entered blocking state [ 2351.559655][T12621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2351.588227][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2351.597234][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2351.621196][T23048] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 02:18:47 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:47 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:18:47 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:47 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') [ 2351.632493][T23048] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2351.689679][T12621] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2351.718970][T12621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2351.760309][T12621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 02:18:47 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:48 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:48 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2352.703947][T23048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2352.711707][T12621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 02:18:49 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:49 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x0, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000380)={0x0, &(0x7f0000000340)}, 0x10) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v1={0x1000000, [{0x4, 0x4b9f0000000}]}, 0xc, 0x1) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0xfff) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000280)=0x10d000) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) 02:18:49 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:49 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 02:18:49 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:49 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:49 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:49 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000240)={r2, 0x80000, r1}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x8000000000000) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000100)={0x2c}) fcntl$getown(0xffffffffffffffff, 0x9) [ 2354.256562][T23128] IPVS: ftp: loaded support on port[0] = 21 [ 2354.522799][T23128] chnl_net:caif_netlink_parms(): no params data found [ 2354.576874][T23128] bridge0: port 1(bridge_slave_0) entered blocking state [ 2354.591234][T23128] bridge0: port 1(bridge_slave_0) entered disabled state [ 2354.599785][T23128] device bridge_slave_0 entered promiscuous mode [ 2354.608950][T23128] bridge0: port 2(bridge_slave_1) entered blocking state [ 2354.616058][T23128] bridge0: port 2(bridge_slave_1) entered disabled state [ 2354.624122][T23128] device bridge_slave_1 entered promiscuous mode [ 2354.648380][T23128] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2354.664629][T23128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2354.685823][T23128] team0: Port device team_slave_0 added [ 2354.693885][T23128] team0: Port device team_slave_1 added [ 2354.739735][T23128] device hsr_slave_0 entered promiscuous mode [ 2354.793405][T23128] device hsr_slave_1 entered promiscuous mode [ 2354.858606][T23128] bridge0: port 2(bridge_slave_1) entered blocking state [ 2354.865710][T23128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2354.873451][T23128] bridge0: port 1(bridge_slave_0) entered blocking state [ 2354.880570][T23128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2354.918908][T23128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2354.934204][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2354.944555][T21875] bridge0: port 1(bridge_slave_0) entered disabled state [ 2354.952849][T21875] bridge0: port 2(bridge_slave_1) entered disabled state [ 2354.969434][T23128] 8021q: adding VLAN 0 to HW filter on device team0 [ 2354.982388][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2354.992053][T21875] bridge0: port 1(bridge_slave_0) entered blocking state [ 2354.999201][T21875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2355.019590][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2355.028721][T21877] bridge0: port 2(bridge_slave_1) entered blocking state [ 2355.035792][T21877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2355.060547][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2355.070040][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2355.079451][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2355.090298][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2355.101382][T23128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2355.110216][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2355.134435][T23128] 8021q: adding VLAN 0 to HW filter on device batadv0 02:18:51 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 02:18:51 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:51 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 02:18:51 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) ioctl$int_out(r2, 0x2, &(0x7f0000000100)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:18:51 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) fcntl$dupfd(r0, 0x406, r2) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:18:51 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2356.425014][T23156] IPVS: ftp: loaded support on port[0] = 21 [ 2356.633550][T23156] chnl_net:caif_netlink_parms(): no params data found [ 2356.662304][T23156] bridge0: port 1(bridge_slave_0) entered blocking state [ 2356.670778][T23156] bridge0: port 1(bridge_slave_0) entered disabled state [ 2356.678978][T23156] device bridge_slave_0 entered promiscuous mode [ 2356.686726][T23156] bridge0: port 2(bridge_slave_1) entered blocking state [ 2356.694554][T23156] bridge0: port 2(bridge_slave_1) entered disabled state [ 2356.702553][T23156] device bridge_slave_1 entered promiscuous mode [ 2356.721161][T23156] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2356.731573][T23156] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2356.752577][T23156] team0: Port device team_slave_0 added [ 2356.760372][T23156] team0: Port device team_slave_1 added [ 2356.819511][T23156] device hsr_slave_0 entered promiscuous mode [ 2356.857970][T23156] device hsr_slave_1 entered promiscuous mode [ 2356.914931][T23156] bridge0: port 2(bridge_slave_1) entered blocking state [ 2356.922031][T23156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2356.929467][T23156] bridge0: port 1(bridge_slave_0) entered blocking state [ 2356.936520][T23156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2357.384185][T23156] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2357.396762][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2357.405946][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2357.415034][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2357.679041][T23156] 8021q: adding VLAN 0 to HW filter on device team0 [ 2357.691912][T23174] IPVS: ftp: loaded support on port[0] = 21 [ 2357.700223][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2357.709406][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2357.718213][ T7089] bridge0: port 1(bridge_slave_0) entered blocking state [ 2357.725267][ T7089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2357.734405][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2357.743298][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2357.752148][ T7089] bridge0: port 2(bridge_slave_1) entered blocking state [ 2357.759339][ T7089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2357.767003][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2357.776047][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2358.012127][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2358.021007][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2358.030219][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2358.039453][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2358.048472][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2358.279161][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2358.288018][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2358.297138][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2358.305783][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2358.316545][T23156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2358.562082][T23156] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2358.852032][T23174] chnl_net:caif_netlink_parms(): no params data found 02:18:55 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:55 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:55 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 02:18:55 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:18:55 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000100), &(0x7f0000000200)=0x4) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:18:55 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2360.020180][T23174] bridge0: port 1(bridge_slave_0) entered blocking state [ 2360.027275][T23174] bridge0: port 1(bridge_slave_0) entered disabled state [ 2360.036059][T23174] device bridge_slave_0 entered promiscuous mode [ 2360.260973][T23174] bridge0: port 2(bridge_slave_1) entered blocking state [ 2360.268600][T23174] bridge0: port 2(bridge_slave_1) entered disabled state [ 2360.276166][T23174] device bridge_slave_1 entered promiscuous mode [ 2360.311783][T23174] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2360.537117][T23174] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2360.556160][T23174] team0: Port device team_slave_0 added [ 2360.563722][T23174] team0: Port device team_slave_1 added [ 2360.620369][T23174] device hsr_slave_0 entered promiscuous mode [ 2360.688929][T23174] device hsr_slave_1 entered promiscuous mode [ 2360.738407][T15265] device bridge_slave_1 left promiscuous mode [ 2360.744641][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2360.802248][T15265] device bridge_slave_0 left promiscuous mode [ 2360.808578][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2360.859271][T15265] device bridge_slave_1 left promiscuous mode [ 2360.865404][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2360.918491][T15265] device bridge_slave_0 left promiscuous mode [ 2360.924654][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2360.989368][T15265] device bridge_slave_1 left promiscuous mode [ 2360.995614][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2361.029276][T15265] device bridge_slave_0 left promiscuous mode [ 2361.035440][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2361.069666][T15265] device bridge_slave_1 left promiscuous mode [ 2361.075899][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2361.128894][T15265] device bridge_slave_0 left promiscuous mode [ 2361.135070][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2366.810565][T15265] device hsr_slave_1 left promiscuous mode [ 2366.880737][T15265] device hsr_slave_0 left promiscuous mode [ 2366.940859][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2366.953802][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2366.964536][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2367.023840][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2367.110880][T15265] bond0 (unregistering): Released all slaves [ 2367.260682][T15265] device hsr_slave_1 left promiscuous mode [ 2367.320753][T15265] device hsr_slave_0 left promiscuous mode [ 2367.372001][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2367.383876][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2367.394644][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2367.433944][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2367.527467][T15265] bond0 (unregistering): Released all slaves [ 2367.680833][T15265] device hsr_slave_1 left promiscuous mode [ 2367.744359][T15265] device hsr_slave_0 left promiscuous mode [ 2367.804214][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2367.815395][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2367.826200][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2367.863991][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2367.936575][T15265] bond0 (unregistering): Released all slaves [ 2368.080903][T15265] device hsr_slave_1 left promiscuous mode [ 2368.122591][T15265] device hsr_slave_0 left promiscuous mode [ 2368.162808][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2368.174463][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2368.186298][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2368.223464][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2368.287205][T15265] bond0 (unregistering): Released all slaves [ 2368.389097][T23204] IPVS: ftp: loaded support on port[0] = 21 [ 2368.488939][T23204] chnl_net:caif_netlink_parms(): no params data found [ 2368.507563][T23174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2368.533156][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2368.543024][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2368.553479][T23174] 8021q: adding VLAN 0 to HW filter on device team0 [ 2368.573564][T23204] bridge0: port 1(bridge_slave_0) entered blocking state [ 2368.581934][T23204] bridge0: port 1(bridge_slave_0) entered disabled state [ 2368.589844][T23204] device bridge_slave_0 entered promiscuous mode [ 2368.614553][T23204] bridge0: port 2(bridge_slave_1) entered blocking state [ 2368.622353][T23204] bridge0: port 2(bridge_slave_1) entered disabled state [ 2368.630924][T23204] device bridge_slave_1 entered promiscuous mode [ 2368.638481][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2368.648599][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2368.657212][T21875] bridge0: port 1(bridge_slave_0) entered blocking state [ 2368.664321][T21875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2368.672518][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2368.681992][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2368.690850][T21875] bridge0: port 2(bridge_slave_1) entered blocking state [ 2368.697955][T21875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2368.705670][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2368.731273][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2368.740259][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2368.749995][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2368.758743][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2368.766992][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2368.776355][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2368.784733][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2368.793004][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2368.812700][T23204] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2368.822972][T23204] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2368.835462][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2368.843962][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2368.852624][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2368.868318][T23174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2368.890724][T23204] team0: Port device team_slave_0 added [ 2368.901560][T23204] team0: Port device team_slave_1 added [ 2368.960637][T23204] device hsr_slave_0 entered promiscuous mode [ 2368.997950][T23204] device hsr_slave_1 entered promiscuous mode [ 2369.061290][T23174] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2369.069836][T23204] bridge0: port 2(bridge_slave_1) entered blocking state [ 2369.076937][T23204] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2369.084452][T23204] bridge0: port 1(bridge_slave_0) entered blocking state [ 2369.091564][T23204] bridge0: port 1(bridge_slave_0) entered forwarding state 02:19:05 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 02:19:05 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) 02:19:05 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:05 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2369.207347][T23204] 8021q: adding VLAN 0 to HW filter on device bond0 02:19:05 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:05 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:05 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2370.105780][T23204] 8021q: adding VLAN 0 to HW filter on device team0 [ 2370.173610][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2370.185773][T21875] bridge0: port 1(bridge_slave_0) entered disabled state [ 2370.230562][T21875] bridge0: port 2(bridge_slave_1) entered disabled state [ 2370.260704][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2370.288278][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2370.317329][T21875] bridge0: port 1(bridge_slave_0) entered blocking state [ 2370.324562][T21875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2370.367931][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2370.387141][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2370.407250][T21875] bridge0: port 2(bridge_slave_1) entered blocking state [ 2370.414468][T21875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2370.452328][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2370.493188][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2370.505323][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2370.531688][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2370.542620][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2370.562827][T23204] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2370.574766][T23204] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2370.592366][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2370.601827][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2370.611322][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2370.622158][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2370.634992][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2370.645851][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2370.672500][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2370.687135][T23204] 8021q: adding VLAN 0 to HW filter on device batadv0 02:19:07 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000200)={0x4, 0x1, @stop_pts=0x790e}) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=""/142) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) getsockopt$bt_hci(r2, 0x0, 0x0, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000280)=0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:19:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:07 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 02:19:07 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) 02:19:07 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x10080, 0x0) recvmsg(r1, &(0x7f0000000880)={&(0x7f0000000200)=@can, 0x80, &(0x7f0000000700)=[{&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/171, 0xab}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/80, 0x50}, {&(0x7f0000000600)=""/212, 0xd4}], 0x6, &(0x7f0000000780)=""/233, 0xe9}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000940)=0x2, 0x4) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f00000008c0)) fcntl$getown(0xffffffffffffffff, 0x9) [ 2372.022166][T23286] IPVS: ftp: loaded support on port[0] = 21 [ 2372.252130][T23286] chnl_net:caif_netlink_parms(): no params data found [ 2372.310392][T23286] bridge0: port 1(bridge_slave_0) entered blocking state [ 2372.322635][T23286] bridge0: port 1(bridge_slave_0) entered disabled state [ 2372.331693][T23286] device bridge_slave_0 entered promiscuous mode [ 2372.345201][T23286] bridge0: port 2(bridge_slave_1) entered blocking state [ 2372.353654][T23286] bridge0: port 2(bridge_slave_1) entered disabled state [ 2372.367202][T23286] device bridge_slave_1 entered promiscuous mode [ 2372.404209][T23286] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2372.415954][T23286] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2372.441102][T23286] team0: Port device team_slave_0 added [ 2372.449107][T23286] team0: Port device team_slave_1 added [ 2372.520354][T23286] device hsr_slave_0 entered promiscuous mode [ 2372.568034][T23286] device hsr_slave_1 entered promiscuous mode [ 2372.620097][T23286] bridge0: port 2(bridge_slave_1) entered blocking state [ 2372.627213][T23286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2372.634779][T23286] bridge0: port 1(bridge_slave_0) entered blocking state [ 2372.642015][T23286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2372.701093][T23286] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2372.713041][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2372.723372][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2372.731535][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2372.744956][T23286] 8021q: adding VLAN 0 to HW filter on device team0 [ 2372.755303][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2372.764499][T19344] bridge0: port 1(bridge_slave_0) entered blocking state [ 2372.771888][T19344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2372.784481][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2372.793800][T17975] bridge0: port 2(bridge_slave_1) entered blocking state [ 2372.800924][T17975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2372.837690][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2372.846283][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2372.856614][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2372.865676][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2372.874716][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2372.883606][T23286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2372.901761][T23286] 8021q: adding VLAN 0 to HW filter on device batadv0 02:19:09 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:09 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:09 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:09 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 02:19:09 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x7) write$P9_RFSYNC(r1, &(0x7f0000000780)={0x7, 0x33, 0x1}, 0x7) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0x0, 0x1000, 0x0, &(0x7f0000ed8000/0x1000)=nil) vmsplice(r0, &(0x7f0000000700)=[{&(0x7f0000000200)="341b9c1da1757ce653f8b058f456b4d3a87ac464f71a3d5f94dde04e49d908200ae11d8920f2cb2ed976cf1be5a03ca4a79798dbe932eafb3005394b808cf0086b419a19633ed4741fc3a0550bcadf0acd032509da3063e425b39eebf68ccb53c4e7568fdc943ff314fb4f17ecb29d749f2532356a9592c17a669d68ea5b1da1ce0ac5de930c51e5540cbbe87b1923443c97808ae8ed030acb0abdeb5016c6b8b28bad480b1612763f449add3a055d8ead38bd9c638bdef43263c2d9a41b1ae926df99aa6d0419f6d8b9bf650e6984faf08cc4196efe78c2ec3ab74db418864948a32acd27232eb3eb19c3", 0xeb}, {&(0x7f0000000300)="83c430bef52c45d5de5e708b4ab76ceade60ab41be79cfa5a847759f85c718bcb30f950b98972ef83815a9653a5c59d2e3b8ffa4ff80bcb5d57085c85966b8739b74ad885ae302da5091e9d20e8a680a0d1d664dca657fc89c3bff239f51b4dfc417808b22fdaf892a3d3c06a40f2190804493c1f43f6f7e877c2de406df95b415bcc73c9a08a8d9238b8254642914d33d8a0283cc52098e35f6d80e434f99dc4a5643e72bfb69fbced1b3cf1776202eeedf22072749dc5e68ee15", 0xbb}, {&(0x7f00000003c0)="5ff50ddda201f91a54b825115aa16c77fb789e18d6e0a199b42db140dd041feefa62fedf48a7dd7b8458e9b016a63a9fdc848d713bee71f3fd035667a6cfde225b99355da6a7c9189a3f5343a587d7f12fa83bff3f4d0c755bb4d50ea38913ef49f92ac6eb88c369f43d36f9c4c6655c9bee2680f9d581a3ee5e92477fbfe5d6517b4cc60a746e2eec74b7614350cbd009e5679a77e82021de2cff6efcce55dbd5b98d38d40e26c03460b9806f0b6610e345cbf8321ca8c3732b6f7e36ed5f9966d66428be5826eb59acdd1c5a0d3250b89dd51f9ee5c5bbfb7308fd01516f49ca5178e5229a5eb584f48a66fc1159c4dc89", 0xf2}, {&(0x7f00000004c0)="dd018f3a3e70ee95542522400039bbe34711027a3f428ea1b45b1e7f2b48d2c5f990d5af94ab390daab8582998ed3d3d08160b2f46ee2ca67b6c0a491803cce90d867188d53d3ebdd18fb5b8ffc8ca09bc785ae0000d217164ba2f392151e8e953f0d52fadb69287406511f68c36e837fcea70013aa808716663b70a64e350a68432316e0d330eb2842b74c520e8170cbdefefa167207f", 0x97}, {&(0x7f0000000100)="99eed7c5946a344295521a27", 0xc}, {&(0x7f0000000580)="8da68c8daa97", 0x6}, {&(0x7f00000005c0)="66f6bc8b70fa4686c1c5b41938799387f666dca7", 0x14}, {&(0x7f0000000600)="d37fcd96556004cab3d6bcab4018e4714ab96b498e63ccbdd8e3a12e1d63e5b474ebc3541182a8f8c9c7954b04f1cf10dcd854d76ede33ec00de7e21308a8a9c620da4a0a16540badbb018657cadf5396446b3c044cd7dd787808002bc7072a893f1d394e7100e600138afd21f2e8e71d3cd2b6723efc00a5b209a653dc73ae9ca05e7936f46b41509f06d56a7f10dd447b0e4a7dfead2310655b849ef239199571a2547fff3e9e26d458d54be1034f3b7608a95a50cc9d9969e9db27a860c91545e1a09432bf88300b68957be4ab5ed2308f9539124057eb0edf3f7cec74e615a683324356b3c344cddd5a65ecc2a52f7bd4fc7", 0xf4}], 0x8, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000007c0)={0x0, 0x7}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000840)={r6, 0x6, 0x30}, &(0x7f0000000880)=0xc) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:19:09 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:09 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:09 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2374.539324][T23312] IPVS: ftp: loaded support on port[0] = 21 [ 2374.935540][T23312] chnl_net:caif_netlink_parms(): no params data found [ 2374.958789][T23312] bridge0: port 1(bridge_slave_0) entered blocking state [ 2374.965936][T23312] bridge0: port 1(bridge_slave_0) entered disabled state [ 2374.974195][T23312] device bridge_slave_0 entered promiscuous mode [ 2374.982502][T23312] bridge0: port 2(bridge_slave_1) entered blocking state [ 2374.989845][T23312] bridge0: port 2(bridge_slave_1) entered disabled state [ 2374.997576][T23312] device bridge_slave_1 entered promiscuous mode [ 2375.017118][T23312] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2375.175816][T23312] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2375.195218][T23312] team0: Port device team_slave_0 added [ 2375.400901][T23312] team0: Port device team_slave_1 added [ 2375.425243][T23332] IPVS: ftp: loaded support on port[0] = 21 [ 2375.460468][T23312] device hsr_slave_0 entered promiscuous mode [ 2375.508008][T23312] device hsr_slave_1 entered promiscuous mode [ 2375.955302][T23332] chnl_net:caif_netlink_parms(): no params data found [ 2376.164534][T23332] bridge0: port 1(bridge_slave_0) entered blocking state [ 2376.173466][T23332] bridge0: port 1(bridge_slave_0) entered disabled state [ 2376.182654][T23332] device bridge_slave_0 entered promiscuous mode [ 2376.192368][T23332] bridge0: port 2(bridge_slave_1) entered blocking state [ 2376.205822][T23332] bridge0: port 2(bridge_slave_1) entered disabled state [ 2376.214782][T23332] device bridge_slave_1 entered promiscuous mode [ 2376.235651][T23332] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2376.247606][T23332] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2376.262507][T23312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2376.288488][T15265] device bridge_slave_1 left promiscuous mode [ 2376.295193][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2376.328504][T15265] device bridge_slave_0 left promiscuous mode [ 2376.335229][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2376.398937][T15265] device bridge_slave_1 left promiscuous mode [ 2376.405370][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2376.458713][T15265] device bridge_slave_0 left promiscuous mode [ 2376.465223][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2376.519566][T15265] device bridge_slave_1 left promiscuous mode [ 2376.526107][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2376.588353][T15265] device bridge_slave_0 left promiscuous mode [ 2376.594665][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2380.930368][T15265] device hsr_slave_1 left promiscuous mode [ 2380.974389][T15265] device hsr_slave_0 left promiscuous mode [ 2381.033710][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2381.046079][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2381.058361][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2381.081926][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2381.166596][T15265] bond0 (unregistering): Released all slaves [ 2381.311918][T15265] device hsr_slave_1 left promiscuous mode [ 2381.372820][T15265] device hsr_slave_0 left promiscuous mode [ 2381.442042][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2381.458725][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2381.470748][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2381.513862][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2381.593489][T15265] bond0 (unregistering): Released all slaves [ 2381.730867][T15265] device hsr_slave_1 left promiscuous mode [ 2381.773100][T15265] device hsr_slave_0 left promiscuous mode [ 2381.832474][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2381.844808][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2381.855373][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2381.882620][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2381.966960][T15265] bond0 (unregistering): Released all slaves [ 2382.061293][T23332] team0: Port device team_slave_0 added [ 2382.070599][T23332] team0: Port device team_slave_1 added [ 2382.093349][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2382.102327][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2382.170370][T23332] device hsr_slave_0 entered promiscuous mode [ 2382.208097][T23332] device hsr_slave_1 entered promiscuous mode [ 2382.260324][T23312] 8021q: adding VLAN 0 to HW filter on device team0 [ 2382.276272][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2382.285261][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2382.294458][T21874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2382.301601][T21874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2382.310125][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2382.330494][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2382.342549][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2382.352007][T19344] bridge0: port 2(bridge_slave_1) entered blocking state [ 2382.359545][T19344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2382.379442][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2382.395015][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2382.403890][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2382.413214][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2382.426833][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2382.435260][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2382.444196][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2382.471019][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2382.479956][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2382.493454][T23312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2382.505232][T23312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2382.513690][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2382.523210][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2382.563945][T23332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2382.576326][T23312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2382.601482][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2382.610077][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2382.621523][T23332] 8021q: adding VLAN 0 to HW filter on device team0 [ 2382.637140][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2382.652482][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2382.662150][T21874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2382.670009][T21874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2382.693210][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2382.701667][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2382.710814][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2382.720580][T12573] bridge0: port 2(bridge_slave_1) entered blocking state [ 2382.727862][T12573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2382.735903][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2382.745243][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2382.754730][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2382.763918][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2382.773042][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2382.782634][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2382.871775][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2382.888852][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 02:19:19 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) 02:19:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) r1 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x2, 0x200000) 02:19:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:19 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:19 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2383.003511][T23332] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2383.085855][T23332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2383.168830][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 02:19:19 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2384.102838][T23332] 8021q: adding VLAN 0 to HW filter on device batadv0 02:19:20 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 02:19:20 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r0, 0xf, 0x1}, 0x14) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) fcntl$getown(0xffffffffffffffff, 0x9) 02:19:20 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) 02:19:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:20 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="00fb4a0104f9168e560b240c25750e0955cdccf8e473fa4c7acd1bd13fdf7efc0a674157110c7bc3470f4ac103cbf290f67f3010658005b44846e7b265ab198ad574501311e566c29468"], 0x4a, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x46000, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) ioctl$RTC_PIE_OFF(r0, 0x7006) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000100)={0x2, 0x1000}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:19:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2385.524329][T23414] IPVS: ftp: loaded support on port[0] = 21 [ 2385.819679][T23414] chnl_net:caif_netlink_parms(): no params data found [ 2385.904338][T23414] bridge0: port 1(bridge_slave_0) entered blocking state [ 2385.911951][T23414] bridge0: port 1(bridge_slave_0) entered disabled state [ 2385.921286][T23414] device bridge_slave_0 entered promiscuous mode [ 2385.932959][T23414] bridge0: port 2(bridge_slave_1) entered blocking state [ 2385.940326][T23414] bridge0: port 2(bridge_slave_1) entered disabled state [ 2385.948803][T23414] device bridge_slave_1 entered promiscuous mode [ 2385.969381][T23414] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2385.979730][T23414] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2386.000415][T23414] team0: Port device team_slave_0 added [ 2386.008008][T23414] team0: Port device team_slave_1 added [ 2386.069437][T23414] device hsr_slave_0 entered promiscuous mode [ 2386.117941][T23414] device hsr_slave_1 entered promiscuous mode [ 2386.167190][T23414] bridge0: port 2(bridge_slave_1) entered blocking state [ 2386.174336][T23414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2386.181774][T23414] bridge0: port 1(bridge_slave_0) entered blocking state [ 2386.188900][T23414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2386.250994][T23414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2386.264631][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2386.272902][ T7089] bridge0: port 1(bridge_slave_0) entered disabled state [ 2386.280985][ T7089] bridge0: port 2(bridge_slave_1) entered disabled state [ 2386.296797][T23414] 8021q: adding VLAN 0 to HW filter on device team0 [ 2386.311882][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2386.320910][T17974] bridge0: port 1(bridge_slave_0) entered blocking state [ 2386.328023][T17974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2386.335873][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2386.346868][T17974] bridge0: port 2(bridge_slave_1) entered blocking state [ 2386.353997][T17974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2386.381246][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2386.390550][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2386.399687][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2386.409914][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2386.423040][T23414] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2386.434185][T23414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2386.450463][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2386.466931][T23414] 8021q: adding VLAN 0 to HW filter on device batadv0 02:19:22 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:22 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:22 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:22 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 02:19:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:19:22 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2387.705504][T23446] IPVS: ftp: loaded support on port[0] = 21 [ 2388.101601][T23446] chnl_net:caif_netlink_parms(): no params data found [ 2388.128417][T23446] bridge0: port 1(bridge_slave_0) entered blocking state [ 2388.135627][T23446] bridge0: port 1(bridge_slave_0) entered disabled state [ 2388.143689][T23446] device bridge_slave_0 entered promiscuous mode [ 2388.311655][T23446] bridge0: port 2(bridge_slave_1) entered blocking state [ 2388.318947][T23446] bridge0: port 2(bridge_slave_1) entered disabled state [ 2388.326608][T23446] device bridge_slave_1 entered promiscuous mode [ 2388.349772][T23446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2388.360450][T23446] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2388.382057][T23446] team0: Port device team_slave_0 added [ 2388.570689][T23446] team0: Port device team_slave_1 added [ 2388.610323][T23446] device hsr_slave_0 entered promiscuous mode [ 2388.657891][T23446] device hsr_slave_1 entered promiscuous mode [ 2388.884289][T23449] IPVS: ftp: loaded support on port[0] = 21 [ 2389.298871][T23449] chnl_net:caif_netlink_parms(): no params data found [ 2389.346215][T23446] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2389.517041][T23449] bridge0: port 1(bridge_slave_0) entered blocking state [ 2389.525182][T23449] bridge0: port 1(bridge_slave_0) entered disabled state [ 2389.532934][T23449] device bridge_slave_0 entered promiscuous mode [ 2389.544078][T23449] bridge0: port 2(bridge_slave_1) entered blocking state [ 2389.551281][T23449] bridge0: port 2(bridge_slave_1) entered disabled state [ 2389.560391][T23449] device bridge_slave_1 entered promiscuous mode [ 2389.573769][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2389.583079][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2389.592452][T23446] 8021q: adding VLAN 0 to HW filter on device team0 [ 2389.600976][T15265] device bridge_slave_1 left promiscuous mode [ 2389.607172][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2389.659216][T15265] device bridge_slave_0 left promiscuous mode [ 2389.665442][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2389.708821][T15265] device bridge_slave_1 left promiscuous mode [ 2389.715185][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2389.748668][T15265] device bridge_slave_0 left promiscuous mode [ 2389.754872][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2389.809604][T15265] device bridge_slave_1 left promiscuous mode [ 2389.815822][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2389.878336][T15265] device bridge_slave_0 left promiscuous mode [ 2389.884497][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2394.170986][T15265] device hsr_slave_1 left promiscuous mode [ 2394.220955][T15265] device hsr_slave_0 left promiscuous mode [ 2394.281012][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2394.293821][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2394.305023][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2394.345678][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2394.439762][T15265] bond0 (unregistering): Released all slaves [ 2394.601337][T15265] device hsr_slave_1 left promiscuous mode [ 2394.662627][T15265] device hsr_slave_0 left promiscuous mode [ 2394.723587][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2394.734697][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2394.747133][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2394.803502][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2394.889238][T15265] bond0 (unregistering): Released all slaves [ 2395.079779][T15265] device hsr_slave_1 left promiscuous mode [ 2395.152482][T15265] device hsr_slave_0 left promiscuous mode [ 2395.220990][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2395.236329][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2395.246653][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2395.293371][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2395.378961][T15265] bond0 (unregistering): Released all slaves [ 2395.489079][T23449] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2395.507138][T23449] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2395.518199][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2395.526756][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2395.535442][T21877] bridge0: port 1(bridge_slave_0) entered blocking state [ 2395.542545][T21877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2395.550261][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2395.558933][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2395.567159][T21877] bridge0: port 2(bridge_slave_1) entered blocking state [ 2395.574261][T21877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2395.581939][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2395.591198][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2395.612823][T23449] team0: Port device team_slave_0 added [ 2395.620133][T23449] team0: Port device team_slave_1 added [ 2395.628543][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2395.646238][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2395.655166][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2395.664010][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2395.749241][T23449] device hsr_slave_0 entered promiscuous mode [ 2395.797931][T23449] device hsr_slave_1 entered promiscuous mode [ 2395.878636][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2395.887151][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2395.896298][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2395.906138][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2395.914579][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2395.922960][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2395.935163][T23446] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2395.973217][T23446] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2395.992263][T23449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2396.014305][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2396.023064][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2396.036742][T23449] 8021q: adding VLAN 0 to HW filter on device team0 [ 2396.058967][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2396.068225][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2396.076576][ T7089] bridge0: port 1(bridge_slave_0) entered blocking state [ 2396.083679][ T7089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2396.124787][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2396.134860][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2396.144800][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2396.154868][T21999] bridge0: port 2(bridge_slave_1) entered blocking state [ 2396.161996][T21999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2396.170692][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2396.179559][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2396.188583][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 02:19:32 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) 02:19:32 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:32 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:32 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000000), 0x4) r3 = open(0x0, 0x410040, 0x0) r4 = gettid() r5 = shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffc000/0x3000)=nil) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) fstat(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f00000004c0)={{0x6, r6, r8, r7, r8, 0x1, 0x1}, 0xad06, 0x4, 0x63c, 0x1f, r4, r4, 0x8}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r9 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) r11 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r11, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:19:32 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2396.215693][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2396.224308][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2396.233703][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2396.242156][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2396.256216][T23449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 02:19:32 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:32 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000100)={r1, 0x0, 0x6, 0x401, 0x800}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000200)="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") move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:19:32 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2397.413639][T23449] 8021q: adding VLAN 0 to HW filter on device batadv0 02:19:33 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 02:19:33 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(0x0, 0x0) 02:19:33 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) 02:19:33 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:19:33 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 02:19:34 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2398.673610][T23538] IPVS: ftp: loaded support on port[0] = 21 [ 2398.854093][T23538] chnl_net:caif_netlink_parms(): no params data found [ 2398.902748][T23538] bridge0: port 1(bridge_slave_0) entered blocking state [ 2398.911107][T23538] bridge0: port 1(bridge_slave_0) entered disabled state [ 2398.918861][T23538] device bridge_slave_0 entered promiscuous mode [ 2398.926587][T23538] bridge0: port 2(bridge_slave_1) entered blocking state [ 2398.934015][T23538] bridge0: port 2(bridge_slave_1) entered disabled state [ 2398.941790][T23538] device bridge_slave_1 entered promiscuous mode [ 2398.963494][T23538] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2398.973768][T23538] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2398.994453][T23538] team0: Port device team_slave_0 added [ 2399.001780][T23538] team0: Port device team_slave_1 added [ 2399.071417][T23538] device hsr_slave_0 entered promiscuous mode [ 2399.133760][T23538] device hsr_slave_1 entered promiscuous mode [ 2399.206591][T23538] bridge0: port 2(bridge_slave_1) entered blocking state [ 2399.213761][T23538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2399.221212][T23538] bridge0: port 1(bridge_slave_0) entered blocking state [ 2399.228418][T23538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2399.297288][T23538] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2399.321683][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2399.335735][ T7089] bridge0: port 1(bridge_slave_0) entered disabled state [ 2399.345762][ T7089] bridge0: port 2(bridge_slave_1) entered disabled state [ 2399.354875][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2399.368151][T23538] 8021q: adding VLAN 0 to HW filter on device team0 [ 2399.378359][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2399.386683][T21876] bridge0: port 1(bridge_slave_0) entered blocking state [ 2399.393988][T21876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2399.409251][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2399.419194][T21877] bridge0: port 2(bridge_slave_1) entered blocking state [ 2399.426232][T21877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2399.447686][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2399.469638][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2399.478688][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2399.487233][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2399.504449][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2399.515772][T23538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2399.542093][T23538] 8021q: adding VLAN 0 to HW filter on device batadv0 02:19:35 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:35 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(0x0, 0x0) 02:19:35 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 02:19:35 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 02:19:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) clock_adjtime(0x0, &(0x7f0000000200)={0x906, 0x2, 0x1, 0x3, 0xfffffffffffffff9, 0xaec4, 0x3ff, 0xe6ac, 0x6, 0xc12, 0x9, 0x81, 0x6, 0x3, 0x7, 0x3fbd47e5, 0x0, 0x6, 0x1ff, 0x3, 0x7fffffff, 0x7, 0x3, 0x1, 0x60000, 0xfffffffffffffffe}) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:06 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(0x0, 0x0) [ 2400.592759][T23580] IPVS: ftp: loaded support on port[0] = 21 [ 2400.946602][T23580] chnl_net:caif_netlink_parms(): no params data found [ 2400.982636][T23580] bridge0: port 1(bridge_slave_0) entered blocking state [ 2400.990739][T23580] bridge0: port 1(bridge_slave_0) entered disabled state [ 2401.002164][T23580] device bridge_slave_0 entered promiscuous mode [ 2401.136968][T23580] bridge0: port 2(bridge_slave_1) entered blocking state [ 2401.144507][T23580] bridge0: port 2(bridge_slave_1) entered disabled state [ 2401.152800][T23580] device bridge_slave_1 entered promiscuous mode [ 2401.305841][T23580] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2401.318388][T23580] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2401.343056][T23580] team0: Port device team_slave_0 added [ 2401.496456][T23580] team0: Port device team_slave_1 added [ 2401.559834][T23580] device hsr_slave_0 entered promiscuous mode [ 2401.618334][T23580] device hsr_slave_1 entered promiscuous mode [ 2401.787176][T23580] bridge0: port 2(bridge_slave_1) entered blocking state [ 2401.795005][T23580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2401.802418][T23580] bridge0: port 1(bridge_slave_0) entered blocking state [ 2401.809521][T23580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2401.846519][T23580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2401.969221][T23580] 8021q: adding VLAN 0 to HW filter on device team0 [ 2401.976430][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2401.985233][T21876] bridge0: port 1(bridge_slave_0) entered disabled state [ 2401.993448][T21876] bridge0: port 2(bridge_slave_1) entered disabled state [ 2402.003010][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2402.120125][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2402.129519][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2402.138378][T21999] bridge0: port 1(bridge_slave_0) entered blocking state [ 2402.145424][T21999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2402.155700][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2402.165941][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2402.174378][T21877] bridge0: port 2(bridge_slave_1) entered blocking state [ 2402.181479][T21877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2402.191557][T15265] device bridge_slave_1 left promiscuous mode [ 2402.198150][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2402.258832][T15265] device bridge_slave_0 left promiscuous mode [ 2402.265039][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2402.309730][T15265] device bridge_slave_1 left promiscuous mode [ 2402.316264][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2402.360245][T15265] device bridge_slave_0 left promiscuous mode [ 2402.366692][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2405.411243][T15265] device hsr_slave_1 left promiscuous mode [ 2405.501485][T15265] device hsr_slave_0 left promiscuous mode [ 2405.585996][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2405.596583][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2405.608075][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2405.641993][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2405.730970][T15265] bond0 (unregistering): Released all slaves [ 2405.901299][T15265] device hsr_slave_1 left promiscuous mode [ 2405.962975][T15265] device hsr_slave_0 left promiscuous mode [ 2406.022437][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2406.033936][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2406.044850][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2406.074053][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2406.139809][T15265] bond0 (unregistering): Released all slaves [ 2406.246109][T23580] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2406.257070][T23580] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2406.270554][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2406.281567][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2406.290788][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2406.299470][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2406.308299][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2406.316796][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2406.325385][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2406.334186][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2406.342790][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2406.351050][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2406.359988][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2406.368743][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2406.386377][T23580] 8021q: adding VLAN 0 to HW filter on device batadv0 03:11:12 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) 03:11:12 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:12 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) r1 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x400, 0x635}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r3, 0x1ff}, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) fallocate(r0, 0x0, 0x42, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000140)=""/186, 0xba}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000040)={0x6}, 0x10) shutdown(r1, 0x0) r3 = dup(r2) recvfrom$inet(r2, 0x0, 0x907, 0x0, 0x0, 0x800e00542) shutdown(r3, 0x0) 03:11:12 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:12 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:12 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/21, 0x15}], 0x100000000000000c) r1 = dup(r0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r2, 0x0) recvmsg(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000b00)=""/172, 0xac}], 0x1}, 0x2) shutdown(r3, 0x0) 03:11:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x18000, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:13 executing program 5: poll(&(0x7f0000000040)=[{}], 0x2000000000000047, 0x52) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e009e0) poll(&(0x7f0000000000)=[{r0, 0x2}], 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 03:11:13 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:11:13 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:13 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:13 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r5, 0x89e3, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x2) fcntl$getown(0xffffffffffffffff, 0x9) creat(&(0x7f0000000200)='./file0\x00', 0xd) 03:11:14 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:11:14 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x1e9, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) fchmod(r1, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x800e00821) 03:11:14 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:14 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(r1) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000200)={0x0, @reserved}) 03:11:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:15 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0x4c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xc523, 0x0, 0x0, 0x800e00526) recvmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000440)=""/4096, 0x1000}, {0x0}], 0x2}, 0x2) shutdown(r1, 0x0) [ 2410.682191][T23721] IPVS: ftp: loaded support on port[0] = 21 [ 2410.741469][T23721] chnl_net:caif_netlink_parms(): no params data found [ 2410.767106][T23721] bridge0: port 1(bridge_slave_0) entered blocking state [ 2410.774448][T23721] bridge0: port 1(bridge_slave_0) entered disabled state [ 2410.782088][T23721] device bridge_slave_0 entered promiscuous mode [ 2411.090423][T23721] bridge0: port 2(bridge_slave_1) entered blocking state [ 2411.097937][T23721] bridge0: port 2(bridge_slave_1) entered disabled state [ 2411.105488][T23721] device bridge_slave_1 entered promiscuous mode [ 2411.273416][T23721] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2411.283777][T23721] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2411.454268][T23721] team0: Port device team_slave_0 added [ 2411.460923][T23721] team0: Port device team_slave_1 added [ 2411.510410][T23721] device hsr_slave_0 entered promiscuous mode [ 2411.548000][T23721] device hsr_slave_1 entered promiscuous mode [ 2411.801733][T23721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2411.814426][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2411.825706][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2411.833715][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2411.844058][T23721] 8021q: adding VLAN 0 to HW filter on device team0 [ 2411.854928][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2411.864018][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2411.872494][T19344] bridge0: port 1(bridge_slave_0) entered blocking state [ 2411.879595][T19344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2411.888877][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2412.059591][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2412.068394][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2412.076638][ T7089] bridge0: port 2(bridge_slave_1) entered blocking state [ 2412.083738][ T7089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2412.093262][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2412.101999][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2412.262834][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2412.276345][T23721] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2412.287265][T23721] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2412.299489][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2412.309262][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2412.317708][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2412.325906][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2412.334339][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2412.501473][T23721] 8021q: adding VLAN 0 to HW filter on device batadv0 03:11:18 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:11:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000140)=""/186, 0xba}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000040)={0x6}, 0x10) shutdown(r1, 0x0) r3 = dup(r2) recvfrom$inet(r2, 0x0, 0x907, 0x0, 0x0, 0x800e00542) shutdown(r3, 0x0) 03:11:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:18 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(r4, 0x9) 03:11:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000140)=""/186, 0xba}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000040)={0x6}, 0x10) shutdown(r1, 0x0) r3 = dup(r2) recvfrom$inet(r2, 0x0, 0x907, 0x2, 0x0, 0x800e00542) shutdown(r3, 0x0) 03:11:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000200)=0x4) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f00000002c0)={0x1}, 0x8, 0x0) 03:11:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x400, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) connect$bt_sco(r5, &(0x7f0000000200)={0x1f, {0x7, 0x9, 0x100, 0xec55, 0x7, 0x8}}, 0x8) 03:11:20 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:11:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000200)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f0000000100)={'crc32-pclmul\x00'}}) open(0x0, 0x199000, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000d0f846ee001800000003000000000000000000000a00000000000000e2ff000000000000"], 0x0, 0x33}, 0x20) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) open(0x0, 0x100, 0x3a) [ 2414.244552][T15265] device bridge_slave_1 left promiscuous mode [ 2414.256040][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2414.328195][T15265] device bridge_slave_0 left promiscuous mode [ 2414.334473][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2414.400609][T15265] device bridge_slave_1 left promiscuous mode [ 2414.413772][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2414.470687][T15265] device bridge_slave_0 left promiscuous mode [ 2414.476946][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2414.549640][T15265] device bridge_slave_1 left promiscuous mode [ 2414.555911][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2414.608649][T15265] device bridge_slave_0 left promiscuous mode [ 2414.614809][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2418.759489][T15265] device hsr_slave_1 left promiscuous mode [ 2418.820784][T15265] device hsr_slave_0 left promiscuous mode [ 2418.880967][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2418.893520][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2418.904434][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2418.932012][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2418.995581][T15265] bond0 (unregistering): Released all slaves [ 2419.159765][T15265] device hsr_slave_1 left promiscuous mode [ 2419.212846][T15265] device hsr_slave_0 left promiscuous mode [ 2419.272196][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2419.283356][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2419.295267][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2419.334577][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2419.429286][T15265] bond0 (unregistering): Released all slaves [ 2419.580693][T15265] device hsr_slave_1 left promiscuous mode [ 2419.651379][T15265] device hsr_slave_0 left promiscuous mode [ 2419.701668][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2419.714328][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2419.725249][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2419.771067][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2419.866610][T15265] bond0 (unregistering): Released all slaves [ 2419.972856][T23788] IPVS: ftp: loaded support on port[0] = 21 [ 2419.972862][T23790] IPVS: ftp: loaded support on port[0] = 21 [ 2420.086493][T23788] chnl_net:caif_netlink_parms(): no params data found [ 2420.146838][T23790] chnl_net:caif_netlink_parms(): no params data found [ 2420.164275][T23788] bridge0: port 1(bridge_slave_0) entered blocking state [ 2420.171488][T23788] bridge0: port 1(bridge_slave_0) entered disabled state [ 2420.180226][T23788] device bridge_slave_0 entered promiscuous mode [ 2420.188089][T23788] bridge0: port 2(bridge_slave_1) entered blocking state [ 2420.195151][T23788] bridge0: port 2(bridge_slave_1) entered disabled state [ 2420.203361][T23788] device bridge_slave_1 entered promiscuous mode [ 2420.240811][T23790] bridge0: port 1(bridge_slave_0) entered blocking state [ 2420.249231][T23790] bridge0: port 1(bridge_slave_0) entered disabled state [ 2420.257006][T23790] device bridge_slave_0 entered promiscuous mode [ 2420.266098][T23788] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2420.278930][T23790] bridge0: port 2(bridge_slave_1) entered blocking state [ 2420.286080][T23790] bridge0: port 2(bridge_slave_1) entered disabled state [ 2420.294532][T23790] device bridge_slave_1 entered promiscuous mode [ 2420.303360][T23788] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2420.327878][T23788] team0: Port device team_slave_0 added [ 2420.340812][T23790] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2420.351161][T23790] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2420.365916][T23788] team0: Port device team_slave_1 added [ 2420.390584][T23790] team0: Port device team_slave_0 added [ 2420.440023][T23788] device hsr_slave_0 entered promiscuous mode [ 2420.488042][T23788] device hsr_slave_1 entered promiscuous mode [ 2420.549067][T23790] team0: Port device team_slave_1 added [ 2420.610262][T23790] device hsr_slave_0 entered promiscuous mode [ 2420.657932][T23790] device hsr_slave_1 entered promiscuous mode [ 2420.718558][T23788] bridge0: port 2(bridge_slave_1) entered blocking state [ 2420.725673][T23788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2420.733059][T23788] bridge0: port 1(bridge_slave_0) entered blocking state [ 2420.740156][T23788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2420.915531][T23790] bridge0: port 2(bridge_slave_1) entered blocking state [ 2420.922684][T23790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2420.930111][T23790] bridge0: port 1(bridge_slave_0) entered blocking state [ 2420.937172][T23790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2420.985061][T23788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2421.016517][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2421.031571][T19344] bridge0: port 1(bridge_slave_0) entered disabled state [ 2421.041451][T19344] bridge0: port 2(bridge_slave_1) entered disabled state [ 2421.055377][T19344] bridge0: port 1(bridge_slave_0) entered disabled state [ 2421.065508][T19344] bridge0: port 2(bridge_slave_1) entered disabled state [ 2421.088495][T23788] 8021q: adding VLAN 0 to HW filter on device team0 [ 2421.110086][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2421.125001][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2421.134130][T19344] bridge0: port 1(bridge_slave_0) entered blocking state [ 2421.141283][T19344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2421.166210][T23790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2421.189271][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2421.201890][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2421.211460][T18109] bridge0: port 2(bridge_slave_1) entered blocking state [ 2421.218627][T18109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2421.234490][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2421.256198][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2421.265443][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2421.274801][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2421.284683][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2421.294530][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2421.309974][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2421.322458][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2421.341942][T23790] 8021q: adding VLAN 0 to HW filter on device team0 [ 2421.351904][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2421.368500][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2421.376436][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2421.385227][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2421.394536][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2421.405484][T23788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2421.419766][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2421.429430][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2421.438448][T21874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2421.445528][T21874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2421.460016][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2421.469464][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2421.478458][T21874] bridge0: port 2(bridge_slave_1) entered blocking state [ 2421.485579][T21874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2421.520693][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2421.530046][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2421.539871][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2421.551343][T21877] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2421.570837][T23788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2421.592201][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2421.606211][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2421.621172][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2421.634256][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2421.646386][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2421.664242][T23790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2421.683192][T23790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2421.694712][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2421.710059][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2421.744266][T23790] 8021q: adding VLAN 0 to HW filter on device batadv0 03:11:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) r1 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(r0, 0x0, r0, 0x0, 0x4) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) move_pages(r1, 0x3, &(0x7f0000000100)=[&(0x7f00005f8000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000d97000/0x2000)=nil], &(0x7f0000000700)=[0x673daee5, 0x1f, 0x2], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r0, 0x10, &(0x7f00000003c0)={&(0x7f0000000300)=""/164, 0xa4, 0xffffffffffffffff}}, 0x10) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580)='trusted.overlay.upper\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x114, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r2, 0x10, &(0x7f0000000440)={&(0x7f0000000280)=""/29, 0x1d, r4}}, 0x10) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_REGS(r6, 0x8090ae81, &(0x7f00000004c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:28 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local}, 0xcc) write(r0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) 03:11:28 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:11:28 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:28 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:28 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:29 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:29 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:29 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:29 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:29 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500), 0x1000) keyctl$assume_authority(0x10, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)) 03:11:29 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x20400, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @loopback}, 0x8a, 0x0, 0x0, 0x0, 0xbc0f, &(0x7f0000000600)='team0\x00', 0x0, 0x9, 0x7}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, r1, 0x0, 0x3) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000200)={"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"}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(r3, 0x9) 03:11:29 executing program 4: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') [ 2424.276660][T23854] IPVS: ftp: loaded support on port[0] = 21 [ 2424.362966][T23854] chnl_net:caif_netlink_parms(): no params data found [ 2424.391302][T23854] bridge0: port 1(bridge_slave_0) entered blocking state [ 2424.398594][T23854] bridge0: port 1(bridge_slave_0) entered disabled state [ 2424.406229][T23854] device bridge_slave_0 entered promiscuous mode [ 2424.415168][T23854] bridge0: port 2(bridge_slave_1) entered blocking state [ 2424.422622][T23854] bridge0: port 2(bridge_slave_1) entered disabled state [ 2424.430355][T23854] device bridge_slave_1 entered promiscuous mode [ 2424.447045][T23854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2424.760780][T23854] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2424.776517][T23854] team0: Port device team_slave_0 added [ 2424.783746][T23854] team0: Port device team_slave_1 added [ 2424.830224][T23854] device hsr_slave_0 entered promiscuous mode [ 2424.867903][T23854] device hsr_slave_1 entered promiscuous mode [ 2425.091318][T23854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2425.297818][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2425.307931][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2425.315644][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2425.327145][T23854] 8021q: adding VLAN 0 to HW filter on device team0 [ 2425.329249][T23857] IPVS: ftp: loaded support on port[0] = 21 [ 2425.340238][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2425.350032][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2425.358590][T17974] bridge0: port 1(bridge_slave_0) entered blocking state [ 2425.365618][T17974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2425.373825][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2425.402550][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2425.413115][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2425.422079][T12573] bridge0: port 2(bridge_slave_1) entered blocking state [ 2425.429195][T12573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2425.601194][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2425.618964][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2425.628034][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2425.636455][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2425.645734][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2425.658509][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2425.666218][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2425.674802][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2425.846651][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2425.856077][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2425.898632][T23857] chnl_net:caif_netlink_parms(): no params data found [ 2425.914222][T23854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2426.105964][T23857] bridge0: port 1(bridge_slave_0) entered blocking state [ 2426.113325][T23857] bridge0: port 1(bridge_slave_0) entered disabled state [ 2426.121428][T23857] device bridge_slave_0 entered promiscuous mode [ 2426.131776][T23857] bridge0: port 2(bridge_slave_1) entered blocking state [ 2426.139254][T23857] bridge0: port 2(bridge_slave_1) entered disabled state [ 2426.146951][T23857] device bridge_slave_1 entered promiscuous mode [ 2426.319750][T23854] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2426.334559][T23857] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2426.347113][T23857] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2426.529128][T23857] team0: Port device team_slave_0 added [ 2426.536825][T23857] team0: Port device team_slave_1 added 03:11:32 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:11:32 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:32 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(0x0, 0x0) 03:11:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) capset(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioprio_get$pid(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) dup3(r0, r1, 0x80000) 03:11:32 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) r5 = fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RGETLOCK(r0, &(0x7f0000000100)={0x27, 0x37, 0x2, {0x0, 0x100000001, 0x2, r5, 0x9, '/dev/kvm\x00'}}, 0x27) [ 2426.778629][T23871] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:11:32 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(0x0, 0x0) 03:11:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./bus\x00', 0x0) 03:11:33 executing program 5: 03:11:33 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000300)={0x0, r0, 0xfff, 0x366, 0x100, 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0x0, 0x4000, 0x80, &(0x7f0000676000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00006f9000/0x18000)=nil, 0x0, 0xffffffffffffffab, 0x0, 0x0, 0xfffffffffffffcb9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x0, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000a88000/0x3000)=nil], &(0x7f0000000040)=[0x2001, 0x7, 0x1, 0x7ff7ffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(r2, 0x9) openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x40000, 0x0) [ 2427.345591][T23857] device hsr_slave_0 entered promiscuous mode 03:11:33 executing program 3: 03:11:33 executing program 5: [ 2427.417981][T23857] device hsr_slave_1 entered promiscuous mode [ 2427.942356][T15265] device bridge_slave_1 left promiscuous mode [ 2427.948754][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2427.978872][T15265] device bridge_slave_0 left promiscuous mode [ 2427.985727][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2428.029982][T15265] device bridge_slave_1 left promiscuous mode [ 2428.036451][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2428.078470][T15265] device bridge_slave_0 left promiscuous mode [ 2428.085107][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2428.129674][T15265] device bridge_slave_1 left promiscuous mode [ 2428.135903][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2428.179300][T15265] device bridge_slave_0 left promiscuous mode [ 2428.185474][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2432.421407][T15265] device hsr_slave_1 left promiscuous mode [ 2432.464119][T15265] device hsr_slave_0 left promiscuous mode [ 2432.522311][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2432.534348][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2432.546249][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2432.583408][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2432.670205][T15265] bond0 (unregistering): Released all slaves [ 2432.819949][T15265] device hsr_slave_1 left promiscuous mode [ 2432.872532][T15265] device hsr_slave_0 left promiscuous mode [ 2432.940840][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2432.954398][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2432.965175][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2433.025453][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2433.085908][T15265] bond0 (unregistering): Released all slaves [ 2433.250858][T15265] device hsr_slave_1 left promiscuous mode [ 2433.302616][T15265] device hsr_slave_0 left promiscuous mode [ 2433.391013][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2433.403319][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2433.414263][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2433.453853][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2433.546654][T15265] bond0 (unregistering): Released all slaves [ 2433.670205][T23906] IPVS: ftp: loaded support on port[0] = 21 [ 2433.740056][T23857] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2433.763698][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2433.772403][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2433.784120][T23857] 8021q: adding VLAN 0 to HW filter on device team0 [ 2433.799038][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2433.809062][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2433.817358][T21875] bridge0: port 1(bridge_slave_0) entered blocking state [ 2433.824587][T21875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2433.833329][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2433.842293][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2433.850814][T21875] bridge0: port 2(bridge_slave_1) entered blocking state [ 2433.858153][T21875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2433.866442][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2433.889666][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2433.935068][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2433.944063][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2433.952979][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2433.962738][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2433.975154][T23906] chnl_net:caif_netlink_parms(): no params data found [ 2433.985640][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2433.995182][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2434.011302][T23857] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2434.022525][T23857] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2434.043270][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2434.052173][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2434.061170][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2434.070842][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2434.099359][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2434.117188][T23857] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2434.124951][T23906] bridge0: port 1(bridge_slave_0) entered blocking state [ 2434.136494][T23906] bridge0: port 1(bridge_slave_0) entered disabled state [ 2434.146439][T23906] device bridge_slave_0 entered promiscuous mode [ 2434.155894][T23906] bridge0: port 2(bridge_slave_1) entered blocking state [ 2434.164201][T23906] bridge0: port 2(bridge_slave_1) entered disabled state [ 2434.172319][T23906] device bridge_slave_1 entered promiscuous mode [ 2434.325918][T23906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2434.348945][T23906] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2434.435423][T23906] team0: Port device team_slave_0 added [ 2434.451112][T23906] team0: Port device team_slave_1 added 03:11:40 executing program 5: 03:11:40 executing program 3: [ 2434.541168][T23906] device hsr_slave_0 entered promiscuous mode [ 2434.623352][T23906] device hsr_slave_1 entered promiscuous mode [ 2435.077769][T23906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2435.101084][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2435.109466][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2435.119860][T23906] 8021q: adding VLAN 0 to HW filter on device team0 [ 2435.130622][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2435.139887][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2435.148979][T18109] bridge0: port 1(bridge_slave_0) entered blocking state [ 2435.156045][T18109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2435.182364][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2435.193533][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2435.205475][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2435.216999][ T7089] bridge0: port 2(bridge_slave_1) entered blocking state [ 2435.224794][ T7089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2435.233875][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2435.242574][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2435.263383][T23906] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2435.274230][T23906] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2435.286915][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2435.296770][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2435.305379][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2435.316734][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2435.325629][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2435.334202][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2435.343034][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2435.351793][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2435.361097][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2435.369005][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2435.389498][T23906] 8021q: adding VLAN 0 to HW filter on device batadv0 03:11:41 executing program 0: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000280)) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000b40)=""/4096) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:41 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:11:41 executing program 5: 03:11:41 executing program 3: 03:11:41 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:41 executing program 5: 03:11:41 executing program 3: 03:11:41 executing program 5: 03:11:41 executing program 3: 03:11:41 executing program 5: 03:11:42 executing program 3: 03:11:42 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000100), &(0x7f00000002c0)=0x40) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000000200)) fcntl$getown(0xffffffffffffffff, 0x9) [ 2437.577873][T23956] IPVS: ftp: loaded support on port[0] = 21 [ 2437.634959][T23956] chnl_net:caif_netlink_parms(): no params data found [ 2437.665201][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 2437.672713][T23956] bridge0: port 1(bridge_slave_0) entered disabled state [ 2437.680773][T23956] device bridge_slave_0 entered promiscuous mode [ 2437.689037][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 2437.696116][T23956] bridge0: port 2(bridge_slave_1) entered disabled state [ 2437.703978][T23956] device bridge_slave_1 entered promiscuous mode [ 2438.014985][T23956] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2438.025307][T23956] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2438.042867][T23956] team0: Port device team_slave_0 added [ 2438.050710][T23956] team0: Port device team_slave_1 added [ 2438.310370][T23956] device hsr_slave_0 entered promiscuous mode [ 2438.358096][T23956] device hsr_slave_1 entered promiscuous mode [ 2438.403465][T23959] IPVS: ftp: loaded support on port[0] = 21 [ 2438.408775][T23956] bridge0: port 2(bridge_slave_1) entered blocking state [ 2438.416497][T23956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2438.423941][T23956] bridge0: port 1(bridge_slave_0) entered blocking state [ 2438.431096][T23956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2438.810251][T12573] bridge0: port 1(bridge_slave_0) entered disabled state [ 2438.818952][T12573] bridge0: port 2(bridge_slave_1) entered disabled state [ 2438.863174][T23956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2439.034805][T23959] chnl_net:caif_netlink_parms(): no params data found [ 2439.232465][T23959] bridge0: port 1(bridge_slave_0) entered blocking state [ 2439.239790][T23959] bridge0: port 1(bridge_slave_0) entered disabled state [ 2439.247635][T23959] device bridge_slave_0 entered promiscuous mode [ 2439.256909][T23956] 8021q: adding VLAN 0 to HW filter on device team0 [ 2439.264110][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2439.272884][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2439.281427][T23959] bridge0: port 2(bridge_slave_1) entered blocking state [ 2439.288813][T23959] bridge0: port 2(bridge_slave_1) entered disabled state [ 2439.296941][T23959] device bridge_slave_1 entered promiscuous mode [ 2439.476142][T23959] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2439.486661][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2439.501246][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2439.509661][T17974] bridge0: port 1(bridge_slave_0) entered blocking state [ 2439.516694][T17974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2439.540817][T23959] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2439.556815][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2439.566025][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2439.575300][T12573] bridge0: port 2(bridge_slave_1) entered blocking state [ 2439.582393][T12573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2439.591052][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2439.599939][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2439.609015][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2439.617496][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2439.625765][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2439.634421][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2439.642900][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2439.651348][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2439.904483][T23959] team0: Port device team_slave_0 added [ 2439.911771][T23959] team0: Port device team_slave_1 added [ 2439.917623][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2439.949949][T23959] device hsr_slave_0 entered promiscuous mode [ 2439.987923][T23959] device hsr_slave_1 entered promiscuous mode [ 2440.028025][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2440.036553][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2440.206053][T23956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2440.245457][T23956] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2440.253305][T15265] device bridge_slave_1 left promiscuous mode [ 2440.260667][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2440.319952][T15265] device bridge_slave_0 left promiscuous mode [ 2440.326130][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2440.378974][T15265] device bridge_slave_1 left promiscuous mode [ 2440.385120][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2440.428609][T15265] device bridge_slave_0 left promiscuous mode [ 2440.434779][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2440.479700][T15265] device bridge_slave_1 left promiscuous mode [ 2440.485879][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2440.538375][T15265] device bridge_slave_0 left promiscuous mode [ 2440.545317][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2444.739404][T15265] device hsr_slave_1 left promiscuous mode [ 2444.792558][T15265] device hsr_slave_0 left promiscuous mode [ 2444.862016][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2444.873060][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2444.884872][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2444.924792][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2444.987235][T15265] bond0 (unregistering): Released all slaves [ 2445.159772][T15265] device hsr_slave_1 left promiscuous mode [ 2445.212825][T15265] device hsr_slave_0 left promiscuous mode [ 2445.272106][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2445.283084][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2445.295087][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2445.342925][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2445.412826][T15265] bond0 (unregistering): Released all slaves [ 2445.590752][T15265] device hsr_slave_1 left promiscuous mode [ 2445.660688][T15265] device hsr_slave_0 left promiscuous mode [ 2445.712763][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2445.724198][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2445.734965][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2445.793817][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2445.887260][T15265] bond0 (unregistering): Released all slaves [ 2446.039323][T23959] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2446.066606][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2446.087840][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2446.098295][T23959] 8021q: adding VLAN 0 to HW filter on device team0 [ 2446.109152][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2446.118870][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2446.127363][ T7089] bridge0: port 1(bridge_slave_0) entered blocking state [ 2446.134472][ T7089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2446.186014][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2446.195538][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2446.205687][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2446.215195][T21999] bridge0: port 2(bridge_slave_1) entered blocking state [ 2446.222314][T21999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2446.231169][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2446.240340][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2446.249501][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2446.258585][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2446.280922][T23959] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2446.291428][T23959] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2446.305662][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2446.313809][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2446.322334][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2446.332800][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2446.341548][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2446.350328][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2446.358702][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2446.367184][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2446.386439][T23959] 8021q: adding VLAN 0 to HW filter on device batadv0 03:11:52 executing program 5: 03:11:52 executing program 3: 03:11:52 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:52 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:11:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x23, 0x0, 0x9da650fac201a1a5) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:52 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:52 executing program 3: 03:11:52 executing program 5: 03:11:52 executing program 3: 03:11:52 executing program 5: poll(&(0x7f0000000040)=[{}], 0x2000000000000047, 0x52) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e009e0) poll(&(0x7f0000000000)=[{r0, 0x2}], 0x1, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x11}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 03:11:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000140)=""/186, 0xba}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) recvfrom$inet(r2, 0x0, 0x907, 0x0, 0x0, 0x800e00542) shutdown(r3, 0x0) 03:11:53 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:53 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000100)) getresgid(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file1\x00', 0x0, 0x10}, 0x10) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xe) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:53 executing program 5: shutdown(0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x2000}, {}], 0x4, 0x8000000000047) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x59c, 0x2, 0x0, 0x800e004de) semget(0x0, 0x3, 0x280) recvfrom$inet(r0, 0x0, 0x1000001ab, 0x2, 0x0, 0x800e004e1) shutdown(r0, 0x0) [ 2448.862708][T24027] IPVS: ftp: loaded support on port[0] = 21 [ 2448.941467][T24027] chnl_net:caif_netlink_parms(): no params data found [ 2448.975271][T24027] bridge0: port 1(bridge_slave_0) entered blocking state [ 2448.982510][T24027] bridge0: port 1(bridge_slave_0) entered disabled state [ 2448.990459][T24027] device bridge_slave_0 entered promiscuous mode [ 2448.999608][T24027] bridge0: port 2(bridge_slave_1) entered blocking state [ 2449.006689][T24027] bridge0: port 2(bridge_slave_1) entered disabled state [ 2449.014414][T24027] device bridge_slave_1 entered promiscuous mode [ 2449.029883][T24027] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2449.138139][T24027] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2449.156409][T24027] team0: Port device team_slave_0 added [ 2449.163367][T24027] team0: Port device team_slave_1 added [ 2449.270304][T24027] device hsr_slave_0 entered promiscuous mode [ 2449.307954][T24027] device hsr_slave_1 entered promiscuous mode [ 2449.406494][T24027] bridge0: port 2(bridge_slave_1) entered blocking state [ 2449.413596][T24027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2449.420967][T24027] bridge0: port 1(bridge_slave_0) entered blocking state [ 2449.428045][T24027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2449.513361][T24027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2449.531605][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2449.540881][T17974] bridge0: port 1(bridge_slave_0) entered disabled state [ 2449.549395][T17974] bridge0: port 2(bridge_slave_1) entered disabled state [ 2449.557350][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2449.623262][T24027] 8021q: adding VLAN 0 to HW filter on device team0 [ 2449.633547][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2449.642226][ T7089] bridge0: port 1(bridge_slave_0) entered blocking state [ 2449.649324][ T7089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2449.714041][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2449.723305][T21875] bridge0: port 2(bridge_slave_1) entered blocking state [ 2449.730461][T21875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2449.748753][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2449.757166][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2449.765971][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2449.831130][T24027] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2449.842005][T24027] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2449.854820][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2449.864002][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2449.873147][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2449.948776][T24027] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2450.068970][T15265] device bridge_slave_1 left promiscuous mode [ 2450.075559][T15265] bridge0: port 2(bridge_slave_1) entered disabled state 03:11:56 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000140)=""/186, 0xba}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000040)={0x6}, 0x10) shutdown(r1, 0x0) r3 = dup(r2) recvfrom$inet(r2, 0x0, 0x907, 0x0, 0x0, 0x800e00542) shutdown(r3, 0x0) 03:11:56 executing program 5: poll(&(0x7f00000000c0)=[{}, {}], 0x2, 0x8000000000047) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x59c, 0x2, 0x0, 0x800e004de) semget(0x0, 0x3, 0x280) recvfrom$inet(r0, 0x0, 0x1000001ab, 0x2, 0x0, 0x800e004e1) shutdown(r0, 0x0) 03:11:56 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) [ 2450.122004][T15265] device bridge_slave_0 left promiscuous mode [ 2450.132736][T15265] bridge0: port 1(bridge_slave_0) entered disabled state 03:11:56 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x0, 0x0) r2 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$sock(r1, &(0x7f00000009c0)={&(0x7f0000000200)=@sco={0x1f, {0x5, 0x7, 0x6, 0xd81, 0x100, 0x570}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000280)="4c53f8a63b28413cce50bc38b460614097ac29b4c255f9733ef20fd80bab4047d22ad885beb952c992ddf1df2ffc4cce127769dd90518fc7178b63bb67cc3180b748c9a24d8d521b14a49da434bc15293a660bd9bc0bf5f32776229c677099c606e687fc86317b87485047d91aa0", 0x6e}, {&(0x7f0000000300)="e328550148087395869106863c3bdca9fe54ce1792cd504142de1d38e660bcc7c0a6c580ceb7c8a8565cbf5e33476ed4d826118e729d8eaff961a98b7549d0642e7a7703443ad959517b7378be07d8e0f655ca94b2b866e449f9a09e97269554380cbe252cc345a9bd9ffd1b6b40a9e57b1d0380a4680e50991523", 0x7b}, {&(0x7f0000000380)="ace60902275687b2330c592f085531a52b5bb98c1d7e1214b0522f144b88b2a4808332643cda64901fa5754f08bda3e02e25de7f97cb988de1c1e78ccebbe554292884ac32d448067d5d2b2a8d5d7b0ec95d0b4e06f3c57904ef6d287b2f0696bd2b317391a544f38a0fc223242313fa5163e890c036654b65e651fd3e", 0x7d}, {&(0x7f0000000400)="8db28bdd555530f2ec3ca45018dff2468e764a4655d4f1d6ec12bd78f8b0b3e6c9a1e2070c45c3a31da98bced5866c749ecaeabcfcb1fd8a00577a9fb9fb561c2d6c446d2ff546df3e9f7b2df125fb863c07e921e9c3", 0x56}, {&(0x7f0000000480)="b5c2ee22d4cec9f27addeef16acf6700cbe22272220a01fb5cbb4b58b9298449b7101a2699e770837f13aac97a64333146eefa7e615c47878959ed6753a0cd6f80df511b6ef95fafa1d8abc5144e7b8101ad1d0f2ca6694ffc3087669c24945089a4ea55cd98e32ecb74d08952492e1ed2b2de85d3aa3fb38a2d30d84d44fa6675087ac6719db00eac216bb35b5e46953f71427e12cc74e21024d7aebae680c2dbcbfad885845491fe8d9c531630d98a58f62909e944b628b78a109b0ea8fa85c92d837f142bc15906e028d7a664b9ed777578dfc5e1339d126a84549997deb8c1463002919c96ae05d6c47807a7", 0xee}, {&(0x7f0000000580)="7a170729951c2213f441f46171ce288fe7544892372a011f2f3f2332cbf6357546c8755e0fab73f1cfab05843720a943a9ff5b5983c7c8bb0381cb2671f12c9f13cf795ae055445ca625393c18f2e22aa89886f4ab2dabb603d0f0ac8e7927c0fc53c9da76d23fa5f7a23f77ccb55fcbfb4ebba6523bbe", 0x77}, {&(0x7f0000000600)="ac925f6a3e0e29a205c10d41c9a9e977512eba587eb8e8d61015515626bc8d548760ff7806bfa411d0f817c90cc7383fe9c56f0f98c554bcca31b74df8157560b2134a0526382ad3b77c65b27a707d2467eba3119b71e4c4e5ee3e6ddfad64bde4e4152557b1f4bbe0fb23f41f6454e61b9c1f69a85ba0f1a7e55b9f5fcf85fc29998d22ed7ae56b54168ceef9969597fbde530cd70374b81b767f22cfadf0499625545d0accdfff343bd8c5a14c6585141408b808f3ed3f782845d94c55f8dbf0c82855ca35117f86c8cd2191b378ff32c8b17249a63ecccbcf770ec289cad61a7f1c57925e589abd817ae73494", 0xee}, {&(0x7f0000000700)="734c7d2feaaf1f2797a3694c1c94e90d0fdfcd8042ee6e70c5a84d9779d361a8d616a9224e294f3bec3291c1dc53b2f2b661ec9e6db266376d5cd8e07faaf4a8272e6ef9e610c080c957c76ae473fe533840f11146e263e9709a0649289cdbfcd7a79b8fcb2280a1505f937eee410776b11ac2e44d506a97902ef1f80ddd3c0a29de7c9b602cbb2d7eab31a140cf08427ae2b5a9", 0x94}, {&(0x7f00000007c0)="04735a3eb083a734b6101a50fdb974bef0d86b1eec8733e9ad2bb8dd65cd", 0x1e}, {&(0x7f0000000800)="5f2da8da59be8c583e1fd927384f5e1360fc31cc81743d2c78cdf62f7e6bcc045a5ce2ebb7da4d7588a6e01711661411225e7c266877f006dab963e9c3bd45f660ec9a21b6cabe378c4d44e779b3a02cf5ac7c0664d4fa1f5f6982f275b2247e3743175a1bc7996d453088102a4249c7f48d70099afa9e8719c84248351ea2aa1c4176ed67028cef0aa844164705395ae39b078ee4509ba137a1552ff639d99af69b", 0xa2}], 0xa, &(0x7f0000000980)=[@mark={{0x14, 0x1, 0x24, 0x40}}], 0x18}, 0x4004800) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000100)) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:56 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:56 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(0x0, 0x0) 03:11:56 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:56 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:11:56 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:56 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe2(&(0x7f0000000100), 0x800) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x4) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:11:57 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:57 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:11:57 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:11:57 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000100)={0x20, 0x3, 0x7fff, 0x8, 0x3}) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x26, &(0x7f0000000200)={@broadcast, @loopback, @initdev}, &(0x7f0000000240)=0xc) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000280)={0x1, 0x0, [], {0x0, @bt={0x4, 0x20, 0x1, 0x2, 0x3, 0x2, 0x1, 0x5, 0x20, 0xffffffff9a6c39cd, 0xb4b4, 0x7, 0x1f, 0x7, 0x2, 0x1f}}}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 2452.979384][T15265] device hsr_slave_1 left promiscuous mode [ 2453.040795][T15265] device hsr_slave_0 left promiscuous mode [ 2453.101638][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2453.114102][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2453.125000][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2453.163338][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2453.258405][T15265] bond0 (unregistering): Released all slaves [ 2453.547938][T24101] IPVS: ftp: loaded support on port[0] = 21 [ 2453.608672][T24101] chnl_net:caif_netlink_parms(): no params data found [ 2453.659268][T24101] bridge0: port 1(bridge_slave_0) entered blocking state [ 2453.666432][T24101] bridge0: port 1(bridge_slave_0) entered disabled state [ 2453.679994][T24101] device bridge_slave_0 entered promiscuous mode [ 2453.743035][T24101] bridge0: port 2(bridge_slave_1) entered blocking state [ 2453.750341][T24101] bridge0: port 2(bridge_slave_1) entered disabled state [ 2453.764425][T24101] device bridge_slave_1 entered promiscuous mode [ 2453.793072][T24101] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2453.810357][T24101] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2453.846024][T24101] team0: Port device team_slave_0 added [ 2453.854073][T24101] team0: Port device team_slave_1 added [ 2453.920284][T24101] device hsr_slave_0 entered promiscuous mode [ 2453.957891][T24101] device hsr_slave_1 entered promiscuous mode [ 2454.024585][T24101] bridge0: port 2(bridge_slave_1) entered blocking state [ 2454.031751][T24101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2454.039197][T24101] bridge0: port 1(bridge_slave_0) entered blocking state [ 2454.046369][T24101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2454.117019][T24101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2454.134724][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2454.144095][T21875] bridge0: port 1(bridge_slave_0) entered disabled state [ 2454.153231][T21875] bridge0: port 2(bridge_slave_1) entered disabled state [ 2454.168239][T24101] 8021q: adding VLAN 0 to HW filter on device team0 [ 2454.181344][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2454.190739][T21875] bridge0: port 1(bridge_slave_0) entered blocking state [ 2454.198630][T21875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2454.219735][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2454.229954][T12573] bridge0: port 2(bridge_slave_1) entered blocking state [ 2454.237139][T12573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2454.266585][T24101] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2454.278358][T24101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2454.294210][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2454.304248][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2454.313398][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2454.325996][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2454.346216][T24101] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2454.355020][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2454.364122][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 03:12:00 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:00 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:00 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:00 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:00 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000380)=r1, 0xfffffffffffffeef) ioctl$TIOCGPGRP(r2, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x1d, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$x25(r0, &(0x7f00000005c0)=""/240, 0xf0, 0x10022, &(0x7f0000000340)={0x9, @null=' \x00'}, 0x12) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8435a50ca6ab7f76}, 0xc, &(0x7f00000003c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="30010000c655ffffffff00000000db34ef0c668e3e01e350a225f41b412d0ba9920425188165589be862a2", @ANYRES16=r6, @ANYBLOB="000328bd7000fddbdf25090000001c0001000800050003000000080008006c00000008000200000000001c0002000800090004000000080008000900000008000700040000000c0002000800050000000100080004009a0c00000c00030008000800600000003c00010008000100020000000800080045000000080004004e23000008000b00736970000800020088000000080006006c630000080005000300000014000100080001000a000000080009006e000000300001000c00070010000000100000000800080007000000080001000a00000008000600666f0000080001000a000000440001040c0006006c626c6300000000000000000000000000000008000900130000000800080009000000b208000b0073697000080004004e230000ec1374b41b3c1d5871185ce9e586fa1e4f57a844c10dfc33fd4e74ee9b1f41ed06d60f0f471479f9687465f9afd59d3de8d4f159ebe5f8252916c52d7ea3d1083a7fb77c0a0209f5fe6186a76597d9474a567b60b9e2a4e14c910b215d5f1e85ca15b30e525af342d80a1b6623e55e1c61c9b7"], 0x130}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000044) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000280)={0x0, 0xfc4}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r7, 0x10000}, 0x8) 03:12:00 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:01 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:01 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:01 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:01 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getsockname$netrom(r0, &(0x7f0000000200)={{0x3, @default}, [@rose, @bcast, @bcast, @null, @bcast, @null, @rose, @netrom]}, &(0x7f0000000280)=0x48) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x12000, 0xfffffffffffffffc) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000340)=""/218) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) connect$unix(r1, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000100)) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:12:01 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:01 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:01 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:01 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:02 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:12:02 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2457.592234][T24177] IPVS: ftp: loaded support on port[0] = 21 [ 2457.748201][T24177] chnl_net:caif_netlink_parms(): no params data found [ 2457.874378][T24177] bridge0: port 1(bridge_slave_0) entered blocking state [ 2457.881530][T24177] bridge0: port 1(bridge_slave_0) entered disabled state [ 2457.892309][T24177] device bridge_slave_0 entered promiscuous mode [ 2457.999627][T24177] bridge0: port 2(bridge_slave_1) entered blocking state [ 2458.006723][T24177] bridge0: port 2(bridge_slave_1) entered disabled state [ 2458.014837][T24177] device bridge_slave_1 entered promiscuous mode [ 2458.041801][T24177] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2458.189396][T24177] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2458.201516][T24180] IPVS: ftp: loaded support on port[0] = 21 [ 2458.236349][T24177] team0: Port device team_slave_0 added [ 2458.350278][T24177] team0: Port device team_slave_1 added [ 2458.420361][T24177] device hsr_slave_0 entered promiscuous mode [ 2458.467813][T24177] device hsr_slave_1 entered promiscuous mode [ 2458.521987][T15265] device bridge_slave_1 left promiscuous mode [ 2458.529653][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2458.588748][T15265] device bridge_slave_0 left promiscuous mode [ 2458.594940][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2458.649709][T15265] device bridge_slave_1 left promiscuous mode [ 2458.655895][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2458.718400][T15265] device bridge_slave_0 left promiscuous mode [ 2458.724612][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2461.450359][T15265] device hsr_slave_1 left promiscuous mode [ 2461.512469][T15265] device hsr_slave_0 left promiscuous mode [ 2461.572464][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2461.583512][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2461.594407][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2461.633822][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2461.728021][T15265] bond0 (unregistering): Released all slaves [ 2461.911059][T15265] device hsr_slave_1 left promiscuous mode [ 2461.953205][T15265] device hsr_slave_0 left promiscuous mode [ 2462.012099][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2462.023282][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2462.035192][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2462.093966][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2462.178020][T15265] bond0 (unregistering): Released all slaves [ 2462.354514][T24180] chnl_net:caif_netlink_parms(): no params data found [ 2462.396100][T24180] bridge0: port 1(bridge_slave_0) entered blocking state [ 2462.404507][T24180] bridge0: port 1(bridge_slave_0) entered disabled state [ 2462.413050][T24180] device bridge_slave_0 entered promiscuous mode [ 2462.421017][T24180] bridge0: port 2(bridge_slave_1) entered blocking state [ 2462.428620][T24180] bridge0: port 2(bridge_slave_1) entered disabled state [ 2462.436227][T24180] device bridge_slave_1 entered promiscuous mode [ 2462.458783][T24180] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2462.469139][T24180] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2462.492223][T24180] team0: Port device team_slave_0 added [ 2462.499440][T24180] team0: Port device team_slave_1 added [ 2462.570284][T24180] device hsr_slave_0 entered promiscuous mode [ 2462.607962][T24180] device hsr_slave_1 entered promiscuous mode [ 2462.687912][T24180] bridge0: port 2(bridge_slave_1) entered blocking state [ 2462.695737][T24180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2462.703116][T24180] bridge0: port 1(bridge_slave_0) entered blocking state [ 2462.710277][T24180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2462.732747][T24177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2462.756230][T12573] bridge0: port 1(bridge_slave_0) entered disabled state [ 2462.764875][T12573] bridge0: port 2(bridge_slave_1) entered disabled state [ 2462.775025][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2462.782769][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2462.792931][T24177] 8021q: adding VLAN 0 to HW filter on device team0 [ 2462.813130][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2462.821970][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2462.830547][T18109] bridge0: port 1(bridge_slave_0) entered blocking state [ 2462.837762][T18109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2462.919200][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2462.927172][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2462.948350][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2462.956663][T19344] bridge0: port 2(bridge_slave_1) entered blocking state [ 2462.963779][T19344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2462.971904][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2463.000428][T24180] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2463.008592][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2463.017201][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2463.032321][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2463.042800][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2463.056018][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2463.073715][T24177] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2463.090672][T24177] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2463.115528][T24180] 8021q: adding VLAN 0 to HW filter on device team0 [ 2463.129255][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2463.143502][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2463.152406][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2463.166071][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2463.176083][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2463.190206][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2463.226566][T24177] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2463.235648][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2463.244247][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2463.271503][T21875] bridge0: port 1(bridge_slave_0) entered blocking state [ 2463.278649][T21875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2463.292462][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2463.312233][T21875] bridge0: port 2(bridge_slave_1) entered blocking state [ 2463.319383][T21875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2463.348926][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2463.363624][T21875] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2463.379853][T24180] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2463.400502][T24180] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2463.424639][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2463.433714][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2463.442856][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2463.459410][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2463.469127][T12573] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2463.515242][T24180] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2463.542929][T17974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:12:09 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:09 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:09 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000240)=@gcm_256={{0x304}, "9b0498dc22db38ed", "f9a4efb35fd651d65524ba6c45ab6e1d424158b0502ec75963e68752d39b8b7e", "f5a1eb41", "d0d751198d3f3079"}, 0x38) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000100)=0x80000001, 0x4) 03:12:09 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:09 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:10 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:10 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = shmget(0x1, 0x4000, 0x7c000000, &(0x7f00006a7000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:12:10 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:10 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x8000, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000200)=0x16, 0x4) r2 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pwrite64(r0, &(0x7f0000000240)="b990cc275d550e855335d95ea394d4849db555d33f0b461cf2c814ef3b14af1fd72a055561949dcde1b46d6236c8201111a0f3ff3cd1168c498986", 0x3b, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:12:10 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) socket$nl_generic(0x10, 0x3, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:12:11 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:11 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') [ 2466.412134][T24241] IPVS: ftp: loaded support on port[0] = 21 [ 2466.551662][T24241] chnl_net:caif_netlink_parms(): no params data found [ 2466.579002][T24241] bridge0: port 1(bridge_slave_0) entered blocking state [ 2466.586161][T24241] bridge0: port 1(bridge_slave_0) entered disabled state [ 2466.594064][T24241] device bridge_slave_0 entered promiscuous mode [ 2466.602226][T24241] bridge0: port 2(bridge_slave_1) entered blocking state [ 2466.609914][T24241] bridge0: port 2(bridge_slave_1) entered disabled state [ 2466.617923][T24241] device bridge_slave_1 entered promiscuous mode [ 2466.634206][T24241] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2466.644306][T24241] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2466.662563][T24241] team0: Port device team_slave_0 added [ 2466.671689][T24241] team0: Port device team_slave_1 added [ 2466.719439][T24241] device hsr_slave_0 entered promiscuous mode [ 2466.757993][T24241] device hsr_slave_1 entered promiscuous mode [ 2467.297343][T24241] bridge0: port 2(bridge_slave_1) entered blocking state [ 2467.304492][T24241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2467.311943][T24241] bridge0: port 1(bridge_slave_0) entered blocking state [ 2467.319143][T24241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2467.329598][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2467.337980][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2467.655733][T24246] IPVS: ftp: loaded support on port[0] = 21 [ 2467.960610][T24241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2468.236029][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2468.244845][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2468.256174][T24241] 8021q: adding VLAN 0 to HW filter on device team0 [ 2468.294426][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2468.304371][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2468.313305][T19344] bridge0: port 1(bridge_slave_0) entered blocking state [ 2468.320576][T19344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2468.586046][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2468.595420][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2468.604048][T16515] bridge0: port 2(bridge_slave_1) entered blocking state [ 2468.611167][T16515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2468.895515][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2468.904537][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2468.913373][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2468.922492][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2468.931993][T24246] chnl_net:caif_netlink_parms(): no params data found [ 2468.943267][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2469.220776][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2469.229652][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2469.258237][T24246] bridge0: port 1(bridge_slave_0) entered blocking state [ 2469.265673][T24246] bridge0: port 1(bridge_slave_0) entered disabled state [ 2469.273969][T24246] device bridge_slave_0 entered promiscuous mode [ 2469.281906][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2469.290551][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2469.551191][T24246] bridge0: port 2(bridge_slave_1) entered blocking state [ 2469.558415][T24246] bridge0: port 2(bridge_slave_1) entered disabled state [ 2469.566175][T24246] device bridge_slave_1 entered promiscuous mode [ 2469.591749][T24246] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2469.600868][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2469.610504][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2469.914601][T24246] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2469.924563][T24241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2469.949125][T24246] team0: Port device team_slave_0 added [ 2469.956782][T24246] team0: Port device team_slave_1 added [ 2469.968574][T15265] device bridge_slave_1 left promiscuous mode [ 2469.974814][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2470.008650][T15265] device bridge_slave_0 left promiscuous mode [ 2470.014862][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2470.069604][T15265] device bridge_slave_1 left promiscuous mode [ 2470.075899][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2470.128999][T15265] device bridge_slave_0 left promiscuous mode [ 2470.135263][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2470.178977][T15265] device bridge_slave_1 left promiscuous mode [ 2470.185125][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2470.248623][T15265] device bridge_slave_0 left promiscuous mode [ 2470.254785][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2470.309384][T15265] device bridge_slave_1 left promiscuous mode [ 2470.315558][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2470.368977][T15265] device bridge_slave_0 left promiscuous mode [ 2470.375162][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2470.429566][T15265] device bridge_slave_1 left promiscuous mode [ 2470.435775][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2470.488760][T15265] device bridge_slave_0 left promiscuous mode [ 2470.494946][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2477.339695][T15265] device hsr_slave_1 left promiscuous mode [ 2477.393211][T15265] device hsr_slave_0 left promiscuous mode [ 2477.452063][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2477.463044][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2477.475081][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2477.514217][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2477.589914][T15265] bond0 (unregistering): Released all slaves [ 2477.769636][T15265] device hsr_slave_1 left promiscuous mode [ 2477.832565][T15265] device hsr_slave_0 left promiscuous mode [ 2477.900779][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2477.913799][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2477.924640][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2477.962455][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2478.028270][T15265] bond0 (unregistering): Released all slaves [ 2478.240608][T15265] device hsr_slave_1 left promiscuous mode [ 2478.300664][T15265] device hsr_slave_0 left promiscuous mode [ 2478.352560][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2478.363567][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2478.374399][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2478.442682][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2478.528280][T15265] bond0 (unregistering): Released all slaves [ 2478.689575][T15265] device hsr_slave_1 left promiscuous mode [ 2478.742473][T15265] device hsr_slave_0 left promiscuous mode [ 2478.802313][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2478.813363][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2478.824244][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2478.892958][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2478.985901][T15265] bond0 (unregistering): Released all slaves [ 2479.150923][T15265] device hsr_slave_1 left promiscuous mode [ 2479.200688][T15265] device hsr_slave_0 left promiscuous mode [ 2479.240764][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2479.255274][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2479.266748][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2479.313579][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2479.415881][T15265] bond0 (unregistering): Released all slaves [ 2479.559400][T24246] device hsr_slave_0 entered promiscuous mode [ 2479.607941][T24246] device hsr_slave_1 entered promiscuous mode [ 2479.676194][T24241] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2479.734428][T24246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2479.748852][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2479.756667][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2479.774335][T24246] 8021q: adding VLAN 0 to HW filter on device team0 [ 2479.794979][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2479.804692][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2479.819259][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2479.826333][T17975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2479.863859][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2479.874801][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2479.887047][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2479.911727][T24136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2479.919014][T24136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2479.926773][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2479.935715][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2479.955364][T24246] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2479.969522][T24246] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2479.992881][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2480.001776][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 03:12:26 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:12:26 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:26 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:26 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2480.015968][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2480.060309][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2480.073781][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2480.114471][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2480.133976][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2480.173484][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2480.184306][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2480.214256][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:12:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.origin\x00') gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0xfffc, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:12:26 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.origin\x00') gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getpgid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6) getpgid(0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0xfffc, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 2480.780183][T24246] 8021q: adding VLAN 0 to HW filter on device batadv0 03:12:26 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:27 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:27 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:27 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:27 executing program 2: pipe(&(0x7f0000000000)) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0xfffffffffffffffd) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="68bd14752ef7ba2d8cdcfd3e7299f80300e6070130275381c90e"], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)='.\x00', 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./bus\x00', 0x80000000000) [ 2481.565639][T24287] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2481.614375][T24284] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2481.626249][T24287] FAT-fs (loop2): Filesystem has been set read-only [ 2481.672868][T24284] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 0) [ 2481.702099][T24283] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF 03:12:27 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') [ 2481.823753][T24287] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2481.870542][T24287] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) 03:12:28 executing program 2: pipe(&(0x7f0000000000)) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0xfffffffffffffffd) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="68bd14752ef7ba2d8cdcfd3e7299f80300e6070130275381c90e"], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)='.\x00', 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./bus\x00', 0x80000000000) [ 2481.979658][T24290] IPVS: ftp: loaded support on port[0] = 21 [ 2482.204068][T24296] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2482.251909][T24293] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2482.257622][T24296] FAT-fs (loop2): Filesystem has been set read-only [ 2482.299715][T24293] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 0) [ 2482.353888][T24290] chnl_net:caif_netlink_parms(): no params data found [ 2482.392877][T24292] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 2482.426800][T24290] bridge0: port 1(bridge_slave_0) entered blocking state [ 2482.439128][T24290] bridge0: port 1(bridge_slave_0) entered disabled state [ 2482.447244][T24290] device bridge_slave_0 entered promiscuous mode [ 2482.460678][T24290] bridge0: port 2(bridge_slave_1) entered blocking state [ 2482.470375][T24290] bridge0: port 2(bridge_slave_1) entered disabled state [ 2482.479825][T24290] device bridge_slave_1 entered promiscuous mode [ 2482.535381][T24290] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2482.570394][T24290] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2482.610214][T24290] team0: Port device team_slave_0 added [ 2482.633336][T24290] team0: Port device team_slave_1 added [ 2482.730140][T24290] device hsr_slave_0 entered promiscuous mode [ 2482.767817][T24290] device hsr_slave_1 entered promiscuous mode [ 2482.821335][T24301] IPVS: ftp: loaded support on port[0] = 21 [ 2482.974123][T24302] IPVS: ftp: loaded support on port[0] = 21 [ 2482.994251][T24290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2483.043403][T24290] 8021q: adding VLAN 0 to HW filter on device team0 [ 2483.066946][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2483.088373][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2483.150619][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2483.168789][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2483.177240][T19344] bridge0: port 1(bridge_slave_0) entered blocking state [ 2483.184389][T19344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2483.217821][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2483.226863][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2483.257945][T19344] bridge0: port 2(bridge_slave_1) entered blocking state [ 2483.265066][T19344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2483.272874][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2483.283553][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2483.309629][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2483.329533][T24301] chnl_net:caif_netlink_parms(): no params data found [ 2483.357939][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2483.366585][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2483.375377][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2483.411806][T24290] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2483.422504][T24290] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2483.456858][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2483.466415][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2483.475248][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2483.483817][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2483.495456][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2483.509276][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2483.518570][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2483.526472][T24301] bridge0: port 1(bridge_slave_0) entered blocking state [ 2483.536306][T24301] bridge0: port 1(bridge_slave_0) entered disabled state [ 2483.549172][T24301] device bridge_slave_0 entered promiscuous mode [ 2483.586265][T24301] bridge0: port 2(bridge_slave_1) entered blocking state [ 2483.595572][T24301] bridge0: port 2(bridge_slave_1) entered disabled state [ 2483.608744][T24301] device bridge_slave_1 entered promiscuous mode [ 2483.667376][T24302] chnl_net:caif_netlink_parms(): no params data found [ 2483.692883][T24301] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2483.710975][T24290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2483.731948][T24301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2483.794185][T24301] team0: Port device team_slave_0 added [ 2483.834111][T24301] team0: Port device team_slave_1 added [ 2483.846476][T24307] IPVS: ftp: loaded support on port[0] = 21 [ 2483.865579][T24302] bridge0: port 1(bridge_slave_0) entered blocking state [ 2483.874057][T24302] bridge0: port 1(bridge_slave_0) entered disabled state [ 2483.897025][T24302] device bridge_slave_0 entered promiscuous mode [ 2483.940145][T24302] bridge0: port 2(bridge_slave_1) entered blocking state [ 2483.947227][T24302] bridge0: port 2(bridge_slave_1) entered disabled state [ 2483.966208][T24302] device bridge_slave_1 entered promiscuous mode [ 2484.040183][T24301] device hsr_slave_0 entered promiscuous mode [ 2484.073009][T24301] device hsr_slave_1 entered promiscuous mode [ 2484.190610][T24302] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2484.206461][T24302] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2484.281889][T24302] team0: Port device team_slave_0 added [ 2484.311694][T24302] team0: Port device team_slave_1 added [ 2484.470278][T24302] device hsr_slave_0 entered promiscuous mode [ 2484.537864][T24302] device hsr_slave_1 entered promiscuous mode [ 2484.611586][T24307] chnl_net:caif_netlink_parms(): no params data found [ 2484.649956][T24307] bridge0: port 1(bridge_slave_0) entered blocking state [ 2484.657100][T24307] bridge0: port 1(bridge_slave_0) entered disabled state [ 2484.665189][T24307] device bridge_slave_0 entered promiscuous mode [ 2484.674404][T24307] bridge0: port 2(bridge_slave_1) entered blocking state [ 2484.683003][T24307] bridge0: port 2(bridge_slave_1) entered disabled state [ 2484.691431][T24307] device bridge_slave_1 entered promiscuous mode [ 2484.705920][T24301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2484.724991][T24319] IPVS: ftp: loaded support on port[0] = 21 [ 2484.757010][T24307] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2484.799300][T24307] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2484.838898][T24307] team0: Port device team_slave_0 added [ 2484.849527][T24307] team0: Port device team_slave_1 added [ 2484.865604][T24301] 8021q: adding VLAN 0 to HW filter on device team0 [ 2484.884229][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2484.892721][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2484.949972][T24307] device hsr_slave_0 entered promiscuous mode [ 2484.998166][T24307] device hsr_slave_1 entered promiscuous mode [ 2485.059677][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2485.068512][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2485.077126][T16515] bridge0: port 1(bridge_slave_0) entered blocking state [ 2485.084239][T16515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2485.093599][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2485.102561][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2485.110971][T16515] bridge0: port 2(bridge_slave_1) entered blocking state [ 2485.118034][T16515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2485.125977][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2485.358778][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2485.367080][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2485.375700][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2485.385320][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2485.394318][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2485.403286][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2485.412012][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2485.420395][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2485.429727][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2485.447376][T24301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2485.460698][T24301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2485.474767][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2485.484051][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2485.629713][T24319] chnl_net:caif_netlink_parms(): no params data found [ 2485.642520][T24302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2485.789169][T24301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2485.945785][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2485.954750][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2485.964415][T24302] 8021q: adding VLAN 0 to HW filter on device team0 [ 2485.976953][T24307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2486.003564][T24319] bridge0: port 1(bridge_slave_0) entered blocking state [ 2486.011270][T24319] bridge0: port 1(bridge_slave_0) entered disabled state [ 2486.019715][T24319] device bridge_slave_0 entered promiscuous mode [ 2486.027631][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2486.036143][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2486.045292][T21704] bridge0: port 1(bridge_slave_0) entered blocking state [ 2486.052423][T21704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2486.062181][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2486.075077][T24319] bridge0: port 2(bridge_slave_1) entered blocking state [ 2486.097083][T24319] bridge0: port 2(bridge_slave_1) entered disabled state [ 2486.121898][T24319] device bridge_slave_1 entered promiscuous mode 03:12:32 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) [ 2486.358881][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2486.371502][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2486.380492][T16515] bridge0: port 2(bridge_slave_1) entered blocking state [ 2486.387610][T16515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2486.396934][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2486.405670][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2486.414218][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2486.423060][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2486.688124][T24319] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2486.699177][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2486.706983][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2486.715647][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2486.724644][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2486.733673][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2486.742454][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2486.750965][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2486.759409][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2486.767176][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2486.780389][T24302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2486.795159][T24307] 8021q: adding VLAN 0 to HW filter on device team0 [ 2486.804424][T24319] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2486.970273][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2486.979533][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2486.989879][T21704] bridge0: port 1(bridge_slave_0) entered blocking state [ 2486.996970][T21704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2487.006405][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2487.024540][T24302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2487.037761][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2487.046556][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2487.056024][T24136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2487.063153][T24136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2487.072298][T24319] team0: Port device team_slave_0 added [ 2487.190239][T24319] team0: Port device team_slave_1 added [ 2487.196952][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2487.222913][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2487.233156][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2487.242468][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2487.251926][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2487.260800][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2487.269997][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2487.278624][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2487.286819][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 03:12:33 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:33 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tee(r1, r0, 0x100000001, 0x0) 03:12:33 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:33 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:33 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 2488.100282][T24319] device hsr_slave_0 entered promiscuous mode [ 2488.139079][T24319] device hsr_slave_1 entered promiscuous mode [ 2488.180584][T15265] device bridge_slave_1 left promiscuous mode [ 2488.186842][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2488.228641][T15265] device bridge_slave_0 left promiscuous mode [ 2488.234835][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2488.279411][T15265] device bridge_slave_1 left promiscuous mode [ 2488.285572][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2488.318277][T15265] device bridge_slave_0 left promiscuous mode [ 2488.324428][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2491.190518][T15265] device hsr_slave_1 left promiscuous mode [ 2491.232538][T15265] device hsr_slave_0 left promiscuous mode [ 2491.272622][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2491.283735][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2491.296097][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2491.353811][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2491.440005][T15265] bond0 (unregistering): Released all slaves [ 2491.620993][T15265] device hsr_slave_1 left promiscuous mode [ 2491.673006][T15265] device hsr_slave_0 left promiscuous mode [ 2491.741030][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2491.753611][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2491.764790][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2491.821844][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2491.907254][T15265] bond0 (unregistering): Released all slaves [ 2492.002155][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2492.011588][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2492.044175][T24353] IPVS: ftp: loaded support on port[0] = 21 [ 2492.052140][T24307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2492.120318][T24307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2492.202613][T24319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2492.254316][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2492.271215][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2492.307279][T24319] 8021q: adding VLAN 0 to HW filter on device team0 03:12:38 executing program 3: accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) fstat(0xffffffffffffffff, 0x0) lstat(0x0, 0x0) setfsgid(0x0) eventfd(0x6) dup(0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x1000)=nil) getpid() lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xfffffffffffffeea, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8200003) getsockopt(0xffffffffffffffff, 0x7fffffff, 0x6, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.threads\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:12:38 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 03:12:38 executing program 2: pipe(&(0x7f0000000000)) syz_open_dev$sndtimer(0x0, 0x0, 0xfffffffffffffffd) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="68bd14752ef7ba2d8cdcfd3e7299f80300e6070130275381c90e"], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)='.\x00', 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./bus\x00', 0x80000000000) 03:12:38 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2492.359877][T24353] chnl_net:caif_netlink_parms(): no params data found [ 2492.369366][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2492.385013][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2492.433618][ T7089] bridge0: port 1(bridge_slave_0) entered blocking state [ 2492.440749][ T7089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2492.648995][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2492.656974][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2492.712289][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2492.752015][T18109] bridge0: port 2(bridge_slave_1) entered blocking state [ 2492.759194][T18109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2492.813451][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2492.851572][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2492.896390][T24319] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2492.942402][T24319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2492.993255][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2493.022468][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2493.061729][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2493.092642][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2493.150921][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2493.233837][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2493.264270][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2493.295792][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2493.351530][T24319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2493.432947][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2493.446364][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2493.474453][T24353] bridge0: port 1(bridge_slave_0) entered blocking state [ 2493.485216][T24353] bridge0: port 1(bridge_slave_0) entered disabled state [ 2493.509357][T24353] device bridge_slave_0 entered promiscuous mode [ 2493.571836][T24353] bridge0: port 2(bridge_slave_1) entered blocking state [ 2493.657497][T24353] bridge0: port 2(bridge_slave_1) entered disabled state [ 2493.665624][T24353] device bridge_slave_1 entered promiscuous mode [ 2493.758014][T24353] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2493.799655][T24353] bond0: Enslaving bond_slave_1 as an active interface with an up link 03:12:39 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:39 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:12:39 executing program 3: pipe(&(0x7f0000000000)) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="68bd14752ef7ba2d8cdcfd3e7299f80300e6070130275381c90e"], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)='.\x00', 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./bus\x00', 0x80000000000) 03:12:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)) [ 2493.874784][T24353] team0: Port device team_slave_0 added [ 2493.890592][T24353] team0: Port device team_slave_1 added 03:12:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x400, 0x8, 0x0, 0x1000, 0x0, 0x0, 0x800, 0x8, 0x1ff, 0x6, 0x0, 0x3f, 0xa4ff, 0x0, 0x26, 0x48, 0x8, 0x101, 0xb72, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0xffffffff, 0x20, 0x7, 0x0, 0x0, 0x8, 0xf5, 0x2, 0x9, 0x7fffffff, 0x1, 0x0, 0x673, 0x0, @perf_config_ext={0x7, 0x4}, 0x0, 0xf29, 0x8, 0x7, 0x0, 0xffffffff, 0x7ff}, 0xffffffffffffffff, 0x0, r0, 0x1) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000180)=""/228, 0xe4}], 0x1) readv(r1, &(0x7f0000000580), 0x3c1) io_cancel(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x65, r1, &(0x7f0000000280), 0x0, 0x9, 0x0, 0x3, r1}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) [ 2494.026830][T24353] device hsr_slave_0 entered promiscuous mode [ 2494.072424][T24409] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2494.146552][T24398] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2494.147762][T24409] FAT-fs (loop3): Filesystem has been set read-only [ 2494.177924][T24353] device hsr_slave_1 entered promiscuous mode 03:12:40 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) [ 2494.201963][T24398] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 0) [ 2494.234071][T24396] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 2494.383769][T24398] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2494.436769][T24422] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 2494.786292][T24353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2494.818998][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2494.826849][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2494.839189][T24353] 8021q: adding VLAN 0 to HW filter on device team0 [ 2494.850037][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2494.860001][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2494.878177][T16515] bridge0: port 1(bridge_slave_0) entered blocking state [ 2494.885259][T16515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2494.909689][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2494.920139][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2494.929256][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2494.945348][T21704] bridge0: port 2(bridge_slave_1) entered blocking state [ 2494.952642][T21704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2494.961491][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2494.971811][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2494.980926][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2494.998419][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2495.006879][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2495.027966][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2495.045719][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2495.053601][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2495.062931][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2495.071515][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2495.080247][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2495.090045][T24353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2495.106581][T24426] IPVS: ftp: loaded support on port[0] = 21 [ 2495.122622][T24353] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2495.293830][T24426] chnl_net:caif_netlink_parms(): no params data found [ 2495.379747][T24426] bridge0: port 1(bridge_slave_0) entered blocking state [ 2495.387094][T24426] bridge0: port 1(bridge_slave_0) entered disabled state [ 2495.397092][T24426] device bridge_slave_0 entered promiscuous mode [ 2495.406620][T24426] bridge0: port 2(bridge_slave_1) entered blocking state [ 2495.413961][T24426] bridge0: port 2(bridge_slave_1) entered disabled state [ 2495.422614][T24426] device bridge_slave_1 entered promiscuous mode [ 2495.446609][T24426] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2495.458273][T24426] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2495.480890][T24426] team0: Port device team_slave_0 added [ 2495.488792][T24426] team0: Port device team_slave_1 added 03:12:41 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:41 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, r3, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) [ 2495.561459][T24426] device hsr_slave_0 entered promiscuous mode 03:12:41 executing program 3: pipe(&(0x7f0000000000)) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="68bd14752ef7ba2d8cdcfd3e7299f80300e6070130275381c90e"], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)='.\x00', 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./bus\x00', 0x80000000000) 03:12:41 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:12:41 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') [ 2495.612312][T24426] device hsr_slave_1 entered promiscuous mode [ 2495.736857][T24426] bridge0: port 2(bridge_slave_1) entered blocking state [ 2495.744026][T24426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2495.752064][T24426] bridge0: port 1(bridge_slave_0) entered blocking state [ 2495.765031][T24426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2496.013790][T24136] bridge0: port 1(bridge_slave_0) entered disabled state [ 2496.030791][T24136] bridge0: port 2(bridge_slave_1) entered disabled state [ 2497.112641][T24426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2497.123656][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2497.133276][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2497.301385][T24426] 8021q: adding VLAN 0 to HW filter on device team0 [ 2497.312081][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2497.321036][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2497.329623][T22000] bridge0: port 1(bridge_slave_0) entered blocking state [ 2497.337379][T22000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2497.558063][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2497.568354][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2497.576949][T21704] bridge0: port 2(bridge_slave_1) entered blocking state [ 2497.584092][T21704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2497.591993][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2497.601104][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2497.610003][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2497.619063][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2497.627754][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2497.636405][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2497.646074][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2497.817538][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2497.826157][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2498.036730][T24426] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2498.051409][T24426] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2498.061106][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2498.069559][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2498.249443][T24466] IPVS: ftp: loaded support on port[0] = 21 [ 2498.256173][T24426] 8021q: adding VLAN 0 to HW filter on device batadv0 03:12:44 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:44 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:44 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:12:44 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000001c0)) 03:12:44 executing program 3: pipe(&(0x7f0000000000)) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="68bd14752ef7ba2d8cdcfd3e7299f80300e6070130275381c90e"], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)='.\x00', 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./bus\x00', 0x80000000000) 03:12:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="000060b0c867bdb09f10c56b9f4b486339599f16a9e22784b2cf3ba1991a20c0d59a42e53ae15f80ce7a7d913fb9e2bce46e5072bb7e3c731325ba9748a980ef"], 0x0, 0x40}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x8000000000000003, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7be070") bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x708cc000}, 0x1c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x102000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:12:44 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:12:45 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:45 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:12:45 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:12:45 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) [ 2499.884716][T24466] chnl_net:caif_netlink_parms(): no params data found [ 2499.906202][T15265] device bridge_slave_1 left promiscuous mode [ 2499.913439][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2499.958391][T15265] device bridge_slave_0 left promiscuous mode [ 2499.964540][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2499.998786][T15265] device bridge_slave_1 left promiscuous mode [ 2500.005039][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2500.078178][T15265] device bridge_slave_0 left promiscuous mode [ 2500.084333][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2500.129571][T15265] device bridge_slave_1 left promiscuous mode [ 2500.135729][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2500.198233][T15265] device bridge_slave_0 left promiscuous mode [ 2500.204376][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2504.371018][T15265] device hsr_slave_1 left promiscuous mode [ 2504.432835][T15265] device hsr_slave_0 left promiscuous mode [ 2504.512776][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2504.524140][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2504.538713][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2504.571308][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2504.639527][T15265] bond0 (unregistering): Released all slaves [ 2504.760759][T15265] device hsr_slave_1 left promiscuous mode [ 2504.805263][T15265] device hsr_slave_0 left promiscuous mode [ 2504.870893][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2504.884683][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2504.895597][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2504.931914][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2505.019753][T15265] bond0 (unregistering): Released all slaves [ 2505.130724][T15265] device hsr_slave_1 left promiscuous mode [ 2505.200540][T15265] device hsr_slave_0 left promiscuous mode [ 2505.260954][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2505.273400][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2505.284209][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2505.322017][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2505.401938][T15265] bond0 (unregistering): Released all slaves [ 2505.519888][T24466] bridge0: port 1(bridge_slave_0) entered blocking state [ 2505.527104][T24466] bridge0: port 1(bridge_slave_0) entered disabled state [ 2505.535843][T24466] device bridge_slave_0 entered promiscuous mode [ 2505.544545][T24466] bridge0: port 2(bridge_slave_1) entered blocking state [ 2505.552373][T24466] bridge0: port 2(bridge_slave_1) entered disabled state [ 2505.560864][T24466] device bridge_slave_1 entered promiscuous mode [ 2505.587339][T24466] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2505.597326][T24466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2505.617614][T24466] team0: Port device team_slave_0 added [ 2505.625703][T24466] team0: Port device team_slave_1 added [ 2505.690468][T24466] device hsr_slave_0 entered promiscuous mode [ 2505.727886][T24466] device hsr_slave_1 entered promiscuous mode [ 2505.796935][T24466] bridge0: port 2(bridge_slave_1) entered blocking state [ 2505.804670][T24466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2505.812093][T24466] bridge0: port 1(bridge_slave_0) entered blocking state [ 2505.819197][T24466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2505.855648][T24466] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2505.869864][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2505.879288][T21704] bridge0: port 1(bridge_slave_0) entered disabled state [ 2505.887214][T21704] bridge0: port 2(bridge_slave_1) entered disabled state [ 2505.895514][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2505.909062][T24466] 8021q: adding VLAN 0 to HW filter on device team0 [ 2505.920409][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2505.929316][T22000] bridge0: port 1(bridge_slave_0) entered blocking state [ 2505.936358][T22000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2505.958178][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2505.966653][ T7089] bridge0: port 2(bridge_slave_1) entered blocking state [ 2505.973763][ T7089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2505.985281][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2505.996889][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2506.017790][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2506.026193][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2506.035261][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2506.046091][T24466] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2506.064868][T24466] 8021q: adding VLAN 0 to HW filter on device batadv0 03:12:52 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:52 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:12:52 executing program 3: pipe(&(0x7f0000000000)) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="68bd14752ef7ba2d8cdcfd3e7299f80300e6070130275381c90e"], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)='.\x00', 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000480)='./bus\x00', 0x80000000000) 03:12:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:12:52 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:52 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:12:52 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:12:52 executing program 3: 03:12:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:12:52 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:12:53 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:53 executing program 3: 03:12:53 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:12:53 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) [ 2508.594315][T24594] IPVS: ftp: loaded support on port[0] = 21 [ 2508.687487][T24594] chnl_net:caif_netlink_parms(): no params data found [ 2508.714707][T24594] bridge0: port 1(bridge_slave_0) entered blocking state [ 2508.721921][T24594] bridge0: port 1(bridge_slave_0) entered disabled state [ 2508.729965][T24594] device bridge_slave_0 entered promiscuous mode [ 2508.737744][T24594] bridge0: port 2(bridge_slave_1) entered blocking state [ 2508.744834][T24594] bridge0: port 2(bridge_slave_1) entered disabled state [ 2508.752937][T24594] device bridge_slave_1 entered promiscuous mode [ 2508.774277][T24594] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2508.785063][T24594] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2508.804176][T24594] team0: Port device team_slave_0 added [ 2508.811334][T24594] team0: Port device team_slave_1 added [ 2508.879410][T24594] device hsr_slave_0 entered promiscuous mode [ 2508.937791][T24594] device hsr_slave_1 entered promiscuous mode [ 2509.193817][T24594] bridge0: port 2(bridge_slave_1) entered blocking state [ 2509.200926][T24594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2509.208439][T24594] bridge0: port 1(bridge_slave_0) entered blocking state [ 2509.215851][T24594] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2509.357264][T24594] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2509.371370][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2509.380317][T29950] bridge0: port 1(bridge_slave_0) entered disabled state [ 2509.388801][T29950] bridge0: port 2(bridge_slave_1) entered disabled state [ 2509.396821][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2509.517154][T24594] 8021q: adding VLAN 0 to HW filter on device team0 [ 2509.529861][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2509.538474][T29950] bridge0: port 1(bridge_slave_0) entered blocking state [ 2509.545526][T29950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2509.716302][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2509.724909][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2509.733838][T17975] bridge0: port 2(bridge_slave_1) entered blocking state [ 2509.740963][T17975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2509.758165][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2509.766839][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2509.776107][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2509.786186][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2509.794823][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2509.803315][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2509.916103][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2509.924604][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2509.933096][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2509.946108][T24594] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2509.959673][T24594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2509.969112][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2509.979021][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2510.096238][T24594] 8021q: adding VLAN 0 to HW filter on device batadv0 03:12:56 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:56 executing program 3: 03:12:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:12:56 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:12:56 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:56 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:12:56 executing program 3: 03:12:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:12:56 executing program 3: 03:12:56 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:12:56 executing program 3: 03:12:56 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0xc8a68ac) 03:12:57 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:12:57 executing program 3: 03:12:57 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) [ 2511.729904][T15265] device bridge_slave_1 left promiscuous mode [ 2511.736126][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2511.800747][T15265] device bridge_slave_0 left promiscuous mode [ 2511.806920][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2511.859545][T15265] device bridge_slave_1 left promiscuous mode [ 2511.865706][T15265] bridge0: port 2(bridge_slave_1) entered disabled state [ 2511.908778][T15265] device bridge_slave_0 left promiscuous mode [ 2511.914968][T15265] bridge0: port 1(bridge_slave_0) entered disabled state [ 2514.719323][T15265] device hsr_slave_1 left promiscuous mode [ 2514.780940][T15265] device hsr_slave_0 left promiscuous mode [ 2514.860992][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2514.873568][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2514.885329][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2514.941770][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2515.028761][T15265] bond0 (unregistering): Released all slaves [ 2515.200937][T15265] device hsr_slave_1 left promiscuous mode [ 2515.244204][T15265] device hsr_slave_0 left promiscuous mode [ 2515.302094][T15265] team0 (unregistering): Port device team_slave_1 removed [ 2515.313506][T15265] team0 (unregistering): Port device team_slave_0 removed [ 2515.325354][T15265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2515.352732][T15265] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2515.425700][T15265] bond0 (unregistering): Released all slaves [ 2515.553021][T24645] IPVS: ftp: loaded support on port[0] = 21 [ 2515.617948][T24645] chnl_net:caif_netlink_parms(): no params data found [ 2515.656229][T24645] bridge0: port 1(bridge_slave_0) entered blocking state [ 2515.663604][T24645] bridge0: port 1(bridge_slave_0) entered disabled state [ 2515.672123][T24645] device bridge_slave_0 entered promiscuous mode [ 2515.680166][T24645] bridge0: port 2(bridge_slave_1) entered blocking state [ 2515.687277][T24645] bridge0: port 2(bridge_slave_1) entered disabled state [ 2515.695068][T24645] device bridge_slave_1 entered promiscuous mode [ 2515.717711][T24645] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2515.727838][T24645] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2515.744103][T24645] team0: Port device team_slave_0 added [ 2515.751764][T24645] team0: Port device team_slave_1 added [ 2515.830332][T24645] device hsr_slave_0 entered promiscuous mode [ 2515.897819][T24645] device hsr_slave_1 entered promiscuous mode [ 2515.977241][T24645] bridge0: port 2(bridge_slave_1) entered blocking state [ 2515.984372][T24645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2515.991758][T24645] bridge0: port 1(bridge_slave_0) entered blocking state [ 2515.999051][T24645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2516.036252][T24645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2516.049441][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2516.058313][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2516.065904][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2516.166374][T24645] 8021q: adding VLAN 0 to HW filter on device team0 [ 2516.183937][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2516.193095][ T7089] bridge0: port 1(bridge_slave_0) entered blocking state [ 2516.200231][ T7089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2516.236551][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2516.246183][T29950] bridge0: port 2(bridge_slave_1) entered blocking state [ 2516.253315][T29950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2516.270097][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2516.284500][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2516.306668][T24645] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2516.322788][T24645] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2516.336210][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2516.350295][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2516.364571][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2516.376298][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2516.406930][T24645] 8021q: adding VLAN 0 to HW filter on device batadv0 03:13:02 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:13:02 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0xc8a68ac) 03:13:02 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:13:02 executing program 3: 03:13:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:13:02 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:02 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0xc8a68ac) 03:13:02 executing program 3: 03:13:02 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:02 executing program 3: 03:13:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:13:03 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:13:03 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:13:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:13:03 executing program 3: 03:13:03 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) [ 2518.839760][T24703] IPVS: ftp: loaded support on port[0] = 21 [ 2518.900939][T24703] chnl_net:caif_netlink_parms(): no params data found [ 2518.926114][T24703] bridge0: port 1(bridge_slave_0) entered blocking state [ 2518.933803][T24703] bridge0: port 1(bridge_slave_0) entered disabled state [ 2518.941584][T24703] device bridge_slave_0 entered promiscuous mode [ 2518.949994][T24703] bridge0: port 2(bridge_slave_1) entered blocking state [ 2518.957130][T24703] bridge0: port 2(bridge_slave_1) entered disabled state [ 2518.964940][T24703] device bridge_slave_1 entered promiscuous mode [ 2519.178863][T24703] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2519.188692][T24703] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2519.207866][T24703] team0: Port device team_slave_0 added [ 2519.214996][T24703] team0: Port device team_slave_1 added [ 2519.370224][T24703] device hsr_slave_0 entered promiscuous mode [ 2519.397836][T24703] device hsr_slave_1 entered promiscuous mode [ 2519.545234][T24703] bridge0: port 2(bridge_slave_1) entered blocking state [ 2519.552330][T24703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2519.559794][T24703] bridge0: port 1(bridge_slave_0) entered blocking state [ 2519.566846][T24703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2519.714343][T24703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2519.725800][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2519.734366][T24136] bridge0: port 1(bridge_slave_0) entered disabled state [ 2519.743306][T24136] bridge0: port 2(bridge_slave_1) entered disabled state [ 2519.752245][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2519.764898][T24703] 8021q: adding VLAN 0 to HW filter on device team0 [ 2519.890585][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2519.902135][T24136] bridge0: port 1(bridge_slave_0) entered blocking state [ 2519.909227][T24136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2519.916753][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2519.927196][T24136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2519.934323][T24136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2520.050197][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2520.059010][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2520.067856][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2520.076769][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2520.085431][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2520.094252][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2520.103562][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2520.216811][T24703] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2520.228368][T24703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2520.236920][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2520.245940][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2520.367226][T24703] 8021q: adding VLAN 0 to HW filter on device batadv0 03:13:06 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:13:06 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:13:06 executing program 3: 03:13:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:13:06 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:13:06 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:06 executing program 3: 03:13:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:13:06 executing program 3: 03:13:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0xc8a68ac) 03:13:06 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000640)='.', 0x0, 0x500c, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055eeaceec7be070") mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) tee(r1, r0, 0x100000001, 0x0) 03:13:53 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) [ 2568.974433][T25129] IPVS: ftp: loaded support on port[0] = 21 [ 2569.049252][T25129] chnl_net:caif_netlink_parms(): no params data found [ 2569.091334][T25129] bridge0: port 1(bridge_slave_0) entered blocking state [ 2569.098724][T25129] bridge0: port 1(bridge_slave_0) entered disabled state [ 2569.106349][T25129] device bridge_slave_0 entered promiscuous mode [ 2569.114139][T25129] bridge0: port 2(bridge_slave_1) entered blocking state [ 2569.121344][T25129] bridge0: port 2(bridge_slave_1) entered disabled state [ 2569.129355][T25129] device bridge_slave_1 entered promiscuous mode [ 2569.146859][T25129] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2569.156966][T25129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2569.173015][T25129] team0: Port device team_slave_0 added [ 2569.180422][T25129] team0: Port device team_slave_1 added [ 2569.229407][T25129] device hsr_slave_0 entered promiscuous mode [ 2569.267845][T25129] device hsr_slave_1 entered promiscuous mode [ 2569.325766][T25129] bridge0: port 2(bridge_slave_1) entered blocking state [ 2569.332916][T25129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2569.340340][T25129] bridge0: port 1(bridge_slave_0) entered blocking state [ 2569.347504][T25129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2569.381886][T25129] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2569.393527][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2569.402479][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2569.410405][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2569.418886][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2569.432889][T25129] 8021q: adding VLAN 0 to HW filter on device team0 [ 2569.444944][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2569.453958][T18109] bridge0: port 1(bridge_slave_0) entered blocking state [ 2569.461355][T18109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2569.479848][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2569.489755][T22000] bridge0: port 2(bridge_slave_1) entered blocking state [ 2569.497963][T22000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2569.521544][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2569.531133][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2569.540408][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2569.552733][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2569.564737][T25129] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2569.577047][T25129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2569.586628][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2569.589977][T25132] IPVS: ftp: loaded support on port[0] = 21 [ 2569.638941][T25129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2569.704610][T25132] chnl_net:caif_netlink_parms(): no params data found [ 2569.765049][T25132] bridge0: port 1(bridge_slave_0) entered blocking state [ 2569.774004][T25132] bridge0: port 1(bridge_slave_0) entered disabled state [ 2569.786762][T25132] device bridge_slave_0 entered promiscuous mode [ 2569.801221][T25132] bridge0: port 2(bridge_slave_1) entered blocking state [ 2569.810370][T25132] bridge0: port 2(bridge_slave_1) entered disabled state [ 2569.818525][T25132] device bridge_slave_1 entered promiscuous mode [ 2569.843463][T25132] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2569.854353][T25132] bond0: Enslaving bond_slave_1 as an active interface with an up link 03:13:55 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:13:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:55 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:13:55 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dd86055e0bceec7be070") syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper={0x40406300}], 0x1, 0xfffffdfd, &(0x7f00000000c0)="f2"}) [ 2569.876963][T25132] team0: Port device team_slave_0 added [ 2569.884680][T25132] team0: Port device team_slave_1 added [ 2569.958519][T25132] device hsr_slave_0 entered promiscuous mode [ 2569.992553][T25149] binder: 25145:25149 ioctl c0306201 20000140 returned -14 [ 2569.998177][T25132] device hsr_slave_1 entered promiscuous mode [ 2570.077824][T25132] bridge0: port 2(bridge_slave_1) entered blocking state [ 2570.084976][T25132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2570.092369][T25132] bridge0: port 1(bridge_slave_0) entered blocking state [ 2570.099472][T25132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2570.117476][T25153] binder: 25145:25153 ioctl c0306201 20000140 returned -14 [ 2570.268848][T16515] bridge0: port 1(bridge_slave_0) entered disabled state [ 2570.276351][T16515] bridge0: port 2(bridge_slave_1) entered disabled state [ 2570.333761][T25132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2570.362240][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2570.381409][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2570.394814][T25132] 8021q: adding VLAN 0 to HW filter on device team0 [ 2570.509359][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2570.518538][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2570.526952][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2570.534098][T17975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2570.546697][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2570.557317][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2570.566025][T17975] bridge0: port 2(bridge_slave_1) entered blocking state [ 2570.573240][T17975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2570.665784][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2570.680008][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2570.751654][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2570.760904][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2570.769998][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2570.779097][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2570.787610][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2570.796076][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2570.854872][T25132] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2570.866541][T25132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2570.874371][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2570.882203][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2570.890808][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2570.964091][T25132] 8021q: adding VLAN 0 to HW filter on device batadv0 03:13:57 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:13:57 executing program 2: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000004c0)={0x8, 0x0, &(0x7f0000000380)=[@release={0x40086310}], 0x0, 0x0, 0x0}) 03:13:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:57 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:13:57 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:13:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$GETVAL(0x0, 0x1, 0xc, &(0x7f0000000100)=""/203) r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @local}, 0xcc) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) write(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x400}, 0x3c) gettid() ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x9ccf) 03:13:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@largeio='largeio'}]}) 03:13:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) [ 2571.534961][T25181] XFS (loop2): Invalid superblock magic number 03:13:57 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:13:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:58 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:13:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:13:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) listxattr(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) pipe(0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000280)={0x60}, 0x60) socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x2, 0x4) write$P9_RFLUSH(r1, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0xfffffe36) [ 2572.718288][T24743] device bridge_slave_1 left promiscuous mode [ 2572.724497][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2572.768482][T24743] device bridge_slave_0 left promiscuous mode [ 2572.774663][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2574.300349][T24743] device hsr_slave_1 left promiscuous mode [ 2574.370815][T24743] device hsr_slave_0 left promiscuous mode [ 2574.422642][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2574.433853][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2574.445196][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2574.483414][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2574.570981][T24743] bond0 (unregistering): Released all slaves [ 2574.670512][T25231] IPVS: ftp: loaded support on port[0] = 21 [ 2574.730506][T25231] chnl_net:caif_netlink_parms(): no params data found [ 2574.762253][T25231] bridge0: port 1(bridge_slave_0) entered blocking state [ 2574.769595][T25231] bridge0: port 1(bridge_slave_0) entered disabled state [ 2574.777249][T25231] device bridge_slave_0 entered promiscuous mode [ 2574.785079][T25231] bridge0: port 2(bridge_slave_1) entered blocking state [ 2574.792305][T25231] bridge0: port 2(bridge_slave_1) entered disabled state [ 2574.800005][T25231] device bridge_slave_1 entered promiscuous mode [ 2574.818930][T25231] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2574.828997][T25231] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2574.913710][T25231] team0: Port device team_slave_0 added [ 2574.921177][T25231] team0: Port device team_slave_1 added [ 2575.010369][T25231] device hsr_slave_0 entered promiscuous mode [ 2575.047859][T25231] device hsr_slave_1 entered promiscuous mode [ 2575.126989][T25231] bridge0: port 2(bridge_slave_1) entered blocking state [ 2575.134143][T25231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2575.141547][T25231] bridge0: port 1(bridge_slave_0) entered blocking state [ 2575.148666][T25231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2575.201359][T25231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2575.215822][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2575.225462][T18109] bridge0: port 1(bridge_slave_0) entered disabled state [ 2575.234211][T18109] bridge0: port 2(bridge_slave_1) entered disabled state [ 2575.248740][T25231] 8021q: adding VLAN 0 to HW filter on device team0 [ 2575.260677][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2575.270070][T18109] bridge0: port 1(bridge_slave_0) entered blocking state [ 2575.277130][T18109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2575.300129][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2575.309738][T22000] bridge0: port 2(bridge_slave_1) entered blocking state [ 2575.316797][T22000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2575.325570][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2575.346032][T25231] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2575.357834][T25231] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2575.371452][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2575.380773][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2575.389603][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2575.399820][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2575.419094][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2575.429138][T25231] 8021q: adding VLAN 0 to HW filter on device batadv0 03:14:01 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:01 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) 03:14:01 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:01 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xf0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 03:14:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) 03:14:01 executing program 2: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000004c0)={0x8, 0x0, &(0x7f0000000380)=[@release={0x40086303}], 0x0, 0x0, 0x0}) 03:14:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:02 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:14:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000380)=""/158, 0x9e}, {0x0}, {0x0}, {0x0}], 0x1, 0x0, 0xffffffffffffff77}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfffffec8, 0x0, 0x0, 0x800e00726) shutdown(r1, 0x0) ppoll(&(0x7f00000000c0)=[{}], 0x1, &(0x7f0000000100)={0x9, 0x3}, &(0x7f0000000140)={0x5}, 0x8) shutdown(r2, 0x0) 03:14:02 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:02 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:02 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) poll(&(0x7f0000000040), 0x2000000000000024, 0x4b) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x896, 0x0, 0x0, 0x800e00871) poll(&(0x7f0000000080)=[{r0, 0x2000}, {r1}], 0x2, 0x4e) shutdown(r1, 0x0) 03:14:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) [ 2577.946941][T25301] IPVS: ftp: loaded support on port[0] = 21 [ 2578.105168][T25301] chnl_net:caif_netlink_parms(): no params data found [ 2578.232731][T25301] bridge0: port 1(bridge_slave_0) entered blocking state [ 2578.240605][T25301] bridge0: port 1(bridge_slave_0) entered disabled state [ 2578.248406][T25301] device bridge_slave_0 entered promiscuous mode [ 2578.256052][T25301] bridge0: port 2(bridge_slave_1) entered blocking state [ 2578.263449][T25301] bridge0: port 2(bridge_slave_1) entered disabled state [ 2578.271463][T25301] device bridge_slave_1 entered promiscuous mode [ 2578.392401][T25301] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2578.402773][T25301] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2578.419785][T25301] team0: Port device team_slave_0 added [ 2578.426466][T25301] team0: Port device team_slave_1 added [ 2578.600230][T25301] device hsr_slave_0 entered promiscuous mode [ 2578.638616][T25301] device hsr_slave_1 entered promiscuous mode [ 2578.782204][T25301] bridge0: port 2(bridge_slave_1) entered blocking state [ 2578.789289][T25301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2578.796596][T25301] bridge0: port 1(bridge_slave_0) entered blocking state [ 2578.803696][T25301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2578.948539][T25301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2578.960686][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2578.972107][T16515] bridge0: port 1(bridge_slave_0) entered disabled state [ 2578.979777][T16515] bridge0: port 2(bridge_slave_1) entered disabled state [ 2578.988301][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2578.998914][T24743] device bridge_slave_1 left promiscuous mode [ 2579.005107][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2579.058920][T24743] device bridge_slave_0 left promiscuous mode [ 2579.065108][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2579.111616][T24743] device bridge_slave_1 left promiscuous mode [ 2579.117940][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2579.158289][T24743] device bridge_slave_0 left promiscuous mode [ 2579.164425][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2581.919436][T24743] device hsr_slave_1 left promiscuous mode [ 2581.983583][T24743] device hsr_slave_0 left promiscuous mode [ 2582.020779][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2582.033389][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2582.043495][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2582.093214][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2582.165382][T24743] bond0 (unregistering): Released all slaves [ 2582.289935][T24743] device hsr_slave_1 left promiscuous mode [ 2582.330758][T24743] device hsr_slave_0 left promiscuous mode [ 2582.382666][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2582.393589][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2582.405268][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2582.444687][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2582.508289][T24743] bond0 (unregistering): Released all slaves [ 2582.605143][T25301] 8021q: adding VLAN 0 to HW filter on device team0 [ 2582.628004][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2582.636535][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2582.645192][T29950] bridge0: port 1(bridge_slave_0) entered blocking state [ 2582.652434][T29950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2582.660573][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2582.669354][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2582.677730][T29950] bridge0: port 2(bridge_slave_1) entered blocking state [ 2582.684789][T29950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2582.692440][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2582.701281][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2582.709932][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2582.718581][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2582.727240][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2582.735833][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2582.744950][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2582.758977][T25301] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2582.772270][T25301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2582.785872][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2582.794891][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2582.803327][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2582.811838][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2582.820979][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2582.840056][T25301] 8021q: adding VLAN 0 to HW filter on device batadv0 03:14:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) 03:14:09 executing program 2: socket$inet6_udp(0x1c, 0x2, 0x0) poll(&(0x7f0000000040), 0x2000000000000024, 0x4b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x896, 0x0, 0x0, 0x800e00871) poll(&(0x7f0000000080)=[{}, {}], 0x2, 0x4e) shutdown(r0, 0x0) 03:14:09 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:09 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:09 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) shmctl$IPC_INFO(0x0, 0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00397) 03:14:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) 03:14:09 executing program 2: socket$inet6_udp(0x1c, 0x2, 0x0) poll(&(0x7f0000000040), 0x2000000000000024, 0x4b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x896, 0x0, 0x0, 0x800e00871) poll(&(0x7f0000000080)=[{}, {r0}], 0x2, 0x4e) shutdown(r0, 0x0) 03:14:09 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) 03:14:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:09 executing program 2: accept(0xffffffffffffffff, 0x0, 0x0) poll(&(0x7f0000000140), 0x1, 0x8000000000049) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffeb3, 0x0, 0x0, 0x800e004de) setsockopt$sock_timeval(r0, 0xffff, 0x100001006, &(0x7f00000000c0)={0x1000000}, 0x10) fcntl$dupfd(r0, 0x0, r0) recvfrom$inet(r0, 0x0, 0xfffffe80, 0x0, 0x0, 0x800e004e1) shutdown(r0, 0x0) 03:14:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:10 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x4002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4c, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2104, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge_slave_0\x00', 0x0}) get_robust_list(0x0, &(0x7f0000000340)=0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000000c0)=r2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={'rose0\x00', 0x2}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)=""/10, 0x0) [ 2585.560416][T25372] IPVS: ftp: loaded support on port[0] = 21 [ 2585.771858][T25372] chnl_net:caif_netlink_parms(): no params data found [ 2585.796507][T25372] bridge0: port 1(bridge_slave_0) entered blocking state [ 2585.803875][T25372] bridge0: port 1(bridge_slave_0) entered disabled state [ 2585.811997][T25372] device bridge_slave_0 entered promiscuous mode [ 2585.867122][T25372] bridge0: port 2(bridge_slave_1) entered blocking state [ 2585.874420][T25372] bridge0: port 2(bridge_slave_1) entered disabled state [ 2585.882595][T25372] device bridge_slave_1 entered promiscuous mode [ 2585.944980][T25372] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2585.955105][T25372] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2585.972466][T25372] team0: Port device team_slave_0 added [ 2585.979648][T25372] team0: Port device team_slave_1 added [ 2586.080188][T25372] device hsr_slave_0 entered promiscuous mode [ 2586.107960][T25372] device hsr_slave_1 entered promiscuous mode [ 2586.221546][T25372] bridge0: port 2(bridge_slave_1) entered blocking state [ 2586.228701][T25372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2586.235967][T25372] bridge0: port 1(bridge_slave_0) entered blocking state [ 2586.243059][T25372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2586.330433][T25372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2586.342013][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2586.350286][T22000] bridge0: port 1(bridge_slave_0) entered disabled state [ 2586.358588][T22000] bridge0: port 2(bridge_slave_1) entered disabled state [ 2586.366428][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2586.431285][T25372] 8021q: adding VLAN 0 to HW filter on device team0 [ 2586.441476][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2586.450075][T21704] bridge0: port 1(bridge_slave_0) entered blocking state [ 2586.457099][T21704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2586.467597][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2586.475985][T29950] bridge0: port 2(bridge_slave_1) entered blocking state [ 2586.483090][T29950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2586.566202][T25372] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2586.576863][T25372] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2586.590515][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2586.599186][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2586.607490][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2586.615721][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2586.627958][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2586.635584][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2586.644554][T24743] device bridge_slave_1 left promiscuous mode [ 2586.650923][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2586.708598][T24743] device bridge_slave_0 left promiscuous mode [ 2586.714745][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2588.109292][T24743] device hsr_slave_1 left promiscuous mode [ 2588.162376][T24743] device hsr_slave_0 left promiscuous mode [ 2588.250540][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2588.261898][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2588.274215][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2588.312283][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2588.395695][T24743] bond0 (unregistering): Released all slaves [ 2588.541232][T25372] 8021q: adding VLAN 0 to HW filter on device batadv0 03:14:14 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:14 executing program 2: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, &(0x7f0000000100)=0x6e, 0x80800) fstat(r0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) eventfd(0x6) dup(0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x1000)=nil) r1 = getpid() lsetxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xfffffffffffffeea, 0x4) sched_setattr(r1, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) fallocate(r2, 0x0, 0x0, 0x8200003) getsockopt(r3, 0x7fffffff, 0x6, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000340)='cgroup.threads\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x0, 0x102) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x12, 0x8, 0x9, "16108652f53b277e3dab5897d2550217ab27ac970cb87955fff2331f98b1835dcb57f3e5cd48de84692fae2d792f755a0e6a5d7cab461d387cd96b5761fd6eb1", "c43864e047a0e05fbe37fcd6c4a81cbc42b94f4f40d515104ec118124088100d", [0x4, 0x7d4a]}) r5 = dup2(r4, r4) accept$inet(r5, 0x0, &(0x7f00000001c0)) clone(0x100000000001fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:14:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:14 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:14 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe11) 03:14:14 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:14 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r1, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000000)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) 03:14:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:15 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:15 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:16 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x100000000007}, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r1, 0x0, 0x0) write$FUSE_INIT(r1, &(0x7f0000000000)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) 03:14:16 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) [ 2591.373731][T25450] IPVS: ftp: loaded support on port[0] = 21 [ 2591.479763][T25450] chnl_net:caif_netlink_parms(): no params data found [ 2591.506326][T25450] bridge0: port 1(bridge_slave_0) entered blocking state [ 2591.513615][T25450] bridge0: port 1(bridge_slave_0) entered disabled state [ 2591.521356][T25450] device bridge_slave_0 entered promiscuous mode [ 2591.578789][T25450] bridge0: port 2(bridge_slave_1) entered blocking state [ 2591.585847][T25450] bridge0: port 2(bridge_slave_1) entered disabled state [ 2591.595822][T25450] device bridge_slave_1 entered promiscuous mode [ 2591.612495][T25450] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2591.622808][T25450] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2591.643023][T25450] team0: Port device team_slave_0 added [ 2591.650359][T25450] team0: Port device team_slave_1 added [ 2591.750613][T25450] device hsr_slave_0 entered promiscuous mode [ 2591.807936][T25450] device hsr_slave_1 entered promiscuous mode [ 2591.905322][T25450] bridge0: port 2(bridge_slave_1) entered blocking state [ 2591.912407][T25450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2591.919778][T25450] bridge0: port 1(bridge_slave_0) entered blocking state [ 2591.926926][T25450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2592.014912][T25450] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2592.026909][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2592.035755][T29950] bridge0: port 1(bridge_slave_0) entered disabled state [ 2592.043828][T29950] bridge0: port 2(bridge_slave_1) entered disabled state [ 2592.052545][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2592.114692][T25450] 8021q: adding VLAN 0 to HW filter on device team0 [ 2592.125270][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2592.134502][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2592.141653][T17975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2592.152695][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2592.161706][T22000] bridge0: port 2(bridge_slave_1) entered blocking state [ 2592.168804][T22000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2592.239735][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2592.256542][T25450] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2592.267999][T25450] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2592.280615][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2592.289114][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2592.297303][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2592.305800][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2592.314085][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2592.323169][T24743] device bridge_slave_1 left promiscuous mode [ 2592.329737][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2592.368859][T24743] device bridge_slave_0 left promiscuous mode [ 2592.375084][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2593.750470][T24743] device hsr_slave_1 left promiscuous mode [ 2593.792889][T24743] device hsr_slave_0 left promiscuous mode [ 2593.852225][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2593.863455][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2593.874940][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2593.914102][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2594.007004][T24743] bond0 (unregistering): Released all slaves [ 2594.158021][T25450] 8021q: adding VLAN 0 to HW filter on device batadv0 03:14:20 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:20 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) 03:14:20 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:20 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, 0x0) 03:14:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:20 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, 0x0) 03:14:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) 03:14:20 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, 0x0) 03:14:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, 0x0) 03:14:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) 03:14:21 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:21 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:22 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, 0x0) [ 2596.899782][T25509] IPVS: ftp: loaded support on port[0] = 21 [ 2596.959646][T25509] chnl_net:caif_netlink_parms(): no params data found [ 2596.986221][T25509] bridge0: port 1(bridge_slave_0) entered blocking state [ 2596.993690][T25509] bridge0: port 1(bridge_slave_0) entered disabled state [ 2597.001626][T25509] device bridge_slave_0 entered promiscuous mode [ 2597.009787][T25509] bridge0: port 2(bridge_slave_1) entered blocking state [ 2597.016876][T25509] bridge0: port 2(bridge_slave_1) entered disabled state [ 2597.025166][T25509] device bridge_slave_1 entered promiscuous mode [ 2597.233032][T25509] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2597.243952][T25509] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2597.262699][T25509] team0: Port device team_slave_0 added [ 2597.269932][T25509] team0: Port device team_slave_1 added [ 2597.419323][T25509] device hsr_slave_0 entered promiscuous mode [ 2597.467931][T25509] device hsr_slave_1 entered promiscuous mode [ 2597.649773][T25509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2597.764847][T25509] 8021q: adding VLAN 0 to HW filter on device team0 [ 2597.772259][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2597.780446][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2597.898072][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2597.906621][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2597.915084][T29950] bridge0: port 1(bridge_slave_0) entered blocking state [ 2597.922432][T29950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2597.930228][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2597.939367][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2597.950352][T29950] bridge0: port 2(bridge_slave_1) entered blocking state [ 2597.957468][T29950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2597.964986][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2597.976264][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2597.985310][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2598.000359][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2598.010832][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2598.019337][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2598.028344][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2598.144687][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2598.158548][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2598.166996][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2598.176133][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2598.184713][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2598.194249][T25509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2598.312431][T25509] 8021q: adding VLAN 0 to HW filter on device batadv0 03:14:24 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) 03:14:24 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, 0x0) 03:14:24 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:24 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, 0x0) 03:14:24 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) 03:14:24 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) 03:14:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) 03:14:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) 03:14:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) [ 2599.513512][T24743] device bridge_slave_1 left promiscuous mode [ 2599.537748][T24743] bridge0: port 2(bridge_slave_1) entered disabled state 03:14:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) 03:14:25 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x0, 0x25dfdbff}, 0x1c}}, 0x0) [ 2599.638979][T24743] device bridge_slave_0 left promiscuous mode [ 2599.648420][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2599.732588][T24743] device bridge_slave_1 left promiscuous mode [ 2599.747177][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2599.829633][T24743] device bridge_slave_0 left promiscuous mode [ 2599.852493][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2602.970306][T24743] device hsr_slave_1 left promiscuous mode [ 2603.040683][T24743] device hsr_slave_0 left promiscuous mode [ 2603.102369][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2603.113483][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2603.126585][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2603.183046][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2603.247249][T24743] bond0 (unregistering): Released all slaves [ 2603.400035][T24743] device hsr_slave_1 left promiscuous mode [ 2603.453220][T24743] device hsr_slave_0 left promiscuous mode [ 2603.520777][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2603.532466][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2603.544891][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2603.611237][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2603.698698][T24743] bond0 (unregistering): Released all slaves 03:14:29 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) 03:14:29 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') [ 2603.862841][T25562] IPVS: ftp: loaded support on port[0] = 21 [ 2603.876733][T25560] IPVS: ftp: loaded support on port[0] = 21 [ 2604.493373][T25562] chnl_net:caif_netlink_parms(): no params data found [ 2604.509062][T25560] chnl_net:caif_netlink_parms(): no params data found [ 2604.603939][T25562] bridge0: port 1(bridge_slave_0) entered blocking state [ 2604.612868][T25562] bridge0: port 1(bridge_slave_0) entered disabled state [ 2604.626600][T25562] device bridge_slave_0 entered promiscuous mode [ 2604.634976][T25560] bridge0: port 1(bridge_slave_0) entered blocking state [ 2604.648283][T25560] bridge0: port 1(bridge_slave_0) entered disabled state [ 2604.656435][T25560] device bridge_slave_0 entered promiscuous mode [ 2604.670284][T25562] bridge0: port 2(bridge_slave_1) entered blocking state [ 2604.677373][T25562] bridge0: port 2(bridge_slave_1) entered disabled state [ 2604.691681][T25562] device bridge_slave_1 entered promiscuous mode [ 2604.703908][T25560] bridge0: port 2(bridge_slave_1) entered blocking state [ 2604.712506][T25560] bridge0: port 2(bridge_slave_1) entered disabled state [ 2604.725778][T25560] device bridge_slave_1 entered promiscuous mode [ 2604.772512][T25562] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2604.790065][T25560] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2604.805851][T25562] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2604.822197][T25560] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2604.870435][T25562] team0: Port device team_slave_0 added [ 2604.882191][T25562] team0: Port device team_slave_1 added [ 2604.889983][T25560] team0: Port device team_slave_0 added [ 2604.897558][T25560] team0: Port device team_slave_1 added [ 2605.000251][T25562] device hsr_slave_0 entered promiscuous mode [ 2605.037961][T25562] device hsr_slave_1 entered promiscuous mode [ 2605.120286][T25560] device hsr_slave_0 entered promiscuous mode [ 2605.157901][T25560] device hsr_slave_1 entered promiscuous mode [ 2605.324007][T25560] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2605.334237][T25562] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2605.355033][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2605.363778][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2605.383384][T25562] 8021q: adding VLAN 0 to HW filter on device team0 [ 2605.392979][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2605.401302][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2605.419139][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2605.428178][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2605.436620][T16515] bridge0: port 1(bridge_slave_0) entered blocking state [ 2605.443739][T16515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2605.452574][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2605.461423][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2605.470844][T16515] bridge0: port 2(bridge_slave_1) entered blocking state [ 2605.477965][T16515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2605.485844][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2605.498918][T25560] 8021q: adding VLAN 0 to HW filter on device team0 [ 2605.514877][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2605.523220][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2605.532725][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2605.544757][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2605.554791][T21704] bridge0: port 1(bridge_slave_0) entered blocking state [ 2605.562123][T21704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2605.571292][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2605.580231][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2605.590622][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2605.599263][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2605.624688][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2605.634362][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2605.643561][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2605.653934][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2605.663201][T24136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2605.670343][T24136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2605.679335][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2605.688768][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2605.697330][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2605.706684][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2605.715915][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2605.725354][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2605.736334][T25562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2605.750405][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2605.759750][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2605.768868][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2605.778284][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2605.787154][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2605.815270][T25560] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2605.826336][T25560] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2605.840326][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2605.850107][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2605.859165][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2605.873111][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2605.885131][T25562] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2605.915053][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2605.926460][T25560] 8021q: adding VLAN 0 to HW filter on device batadv0 03:14:32 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:32 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:32 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:32 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}]}}) 03:14:32 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:32 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:33 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:33 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:33 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:33 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:33 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:33 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:33 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) [ 2608.830037][T25649] IPVS: ftp: loaded support on port[0] = 21 [ 2609.097043][T25649] chnl_net:caif_netlink_parms(): no params data found [ 2609.223518][T25649] bridge0: port 1(bridge_slave_0) entered blocking state [ 2609.230741][T25649] bridge0: port 1(bridge_slave_0) entered disabled state [ 2609.239528][T25649] device bridge_slave_0 entered promiscuous mode [ 2609.247182][T25649] bridge0: port 2(bridge_slave_1) entered blocking state [ 2609.254727][T25649] bridge0: port 2(bridge_slave_1) entered disabled state [ 2609.262525][T25649] device bridge_slave_1 entered promiscuous mode [ 2609.376066][T25649] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2609.386620][T25649] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2609.405113][T25649] team0: Port device team_slave_0 added [ 2609.412758][T25649] team0: Port device team_slave_1 added [ 2609.424895][T24743] device bridge_slave_1 left promiscuous mode [ 2609.431362][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2609.488459][T24743] device bridge_slave_0 left promiscuous mode [ 2609.494668][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2609.549786][T24743] device bridge_slave_1 left promiscuous mode [ 2609.555942][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2609.608836][T24743] device bridge_slave_0 left promiscuous mode [ 2609.614992][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2612.360531][T24743] device hsr_slave_1 left promiscuous mode [ 2612.402949][T24743] device hsr_slave_0 left promiscuous mode [ 2612.462403][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2612.473553][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2612.484745][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2612.551844][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2612.608624][T24743] bond0 (unregistering): Released all slaves [ 2612.799670][T24743] device hsr_slave_1 left promiscuous mode [ 2612.860892][T24743] device hsr_slave_0 left promiscuous mode [ 2612.912687][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2612.923903][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2612.934920][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2612.973856][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2613.061322][T24743] bond0 (unregistering): Released all slaves [ 2613.230331][T25649] device hsr_slave_0 entered promiscuous mode [ 2613.258738][T25649] device hsr_slave_1 entered promiscuous mode [ 2613.318769][T25652] IPVS: ftp: loaded support on port[0] = 21 [ 2613.384103][T25649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2613.399091][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2613.406820][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2613.423837][T25649] 8021q: adding VLAN 0 to HW filter on device team0 [ 2613.465649][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2613.477720][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2613.486068][T16515] bridge0: port 1(bridge_slave_0) entered blocking state [ 2613.493183][T16515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2613.501461][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2613.510682][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2613.519136][T16515] bridge0: port 2(bridge_slave_1) entered blocking state [ 2613.526166][T16515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2613.533835][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2613.542849][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2613.551933][T16515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2613.580640][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2613.591698][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2613.600637][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2613.620931][T25652] chnl_net:caif_netlink_parms(): no params data found [ 2613.635244][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2613.644037][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2613.708709][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2613.717192][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2613.777308][T25652] bridge0: port 1(bridge_slave_0) entered blocking state [ 2613.785538][T25652] bridge0: port 1(bridge_slave_0) entered disabled state [ 2613.793928][T25652] device bridge_slave_0 entered promiscuous mode [ 2613.802477][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2613.814091][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2613.825425][T25652] bridge0: port 2(bridge_slave_1) entered blocking state [ 2613.843242][T25652] bridge0: port 2(bridge_slave_1) entered disabled state [ 2613.851598][T25652] device bridge_slave_1 entered promiscuous mode [ 2613.865915][T25649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2613.913765][T25652] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2613.931701][T25649] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2613.946984][T25652] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2613.976602][T25652] team0: Port device team_slave_0 added [ 2613.992440][T25652] team0: Port device team_slave_1 added [ 2614.040192][T25652] device hsr_slave_0 entered promiscuous mode [ 2614.108016][T25652] device hsr_slave_1 entered promiscuous mode [ 2614.266810][T25652] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2614.286290][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2614.310308][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2614.332663][T25652] 8021q: adding VLAN 0 to HW filter on device team0 [ 2614.350010][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2614.365269][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2614.377207][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2614.384368][T17975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2614.424856][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2614.454274][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2614.463891][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2614.485900][T24136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2614.493061][T24136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2614.522628][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2614.532169][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2614.561686][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2614.570953][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2614.579512][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2614.588863][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2614.597063][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2614.605892][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2614.614722][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2614.623144][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2614.633537][T25652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2614.784679][T24136] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2614.813516][T25652] 8021q: adding VLAN 0 to HW filter on device batadv0 03:14:41 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:41 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:41 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:41 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:41 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:41 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:41 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:41 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:41 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:42 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:42 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:42 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) [ 2617.662348][T25716] IPVS: ftp: loaded support on port[0] = 21 [ 2617.865895][T25716] chnl_net:caif_netlink_parms(): no params data found [ 2618.077154][T25716] bridge0: port 1(bridge_slave_0) entered blocking state [ 2618.085652][T25716] bridge0: port 1(bridge_slave_0) entered disabled state [ 2618.093366][T25716] device bridge_slave_0 entered promiscuous mode [ 2618.101497][T25716] bridge0: port 2(bridge_slave_1) entered blocking state [ 2618.108772][T25716] bridge0: port 2(bridge_slave_1) entered disabled state [ 2618.116310][T25716] device bridge_slave_1 entered promiscuous mode [ 2618.282179][T25719] IPVS: ftp: loaded support on port[0] = 21 [ 2618.290584][T25716] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2618.300433][T25716] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2618.324117][T25716] team0: Port device team_slave_0 added [ 2618.331433][T25716] team0: Port device team_slave_1 added [ 2618.580321][T25716] device hsr_slave_0 entered promiscuous mode [ 2618.618555][T25716] device hsr_slave_1 entered promiscuous mode [ 2618.886499][T25719] chnl_net:caif_netlink_parms(): no params data found [ 2618.896873][T25716] bridge0: port 2(bridge_slave_1) entered blocking state [ 2618.903965][T25716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2618.911326][T25716] bridge0: port 1(bridge_slave_0) entered blocking state [ 2618.918408][T25716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2618.932931][T29950] bridge0: port 1(bridge_slave_0) entered disabled state [ 2618.940568][T29950] bridge0: port 2(bridge_slave_1) entered disabled state [ 2619.129985][T25719] bridge0: port 1(bridge_slave_0) entered blocking state [ 2619.137135][T25719] bridge0: port 1(bridge_slave_0) entered disabled state [ 2619.144980][T25719] device bridge_slave_0 entered promiscuous mode [ 2619.157292][T25719] bridge0: port 2(bridge_slave_1) entered blocking state [ 2619.164600][T25719] bridge0: port 2(bridge_slave_1) entered disabled state [ 2619.173265][T25719] device bridge_slave_1 entered promiscuous mode [ 2619.181221][T24743] device bridge_slave_1 left promiscuous mode [ 2619.187440][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2619.231290][T24743] device bridge_slave_0 left promiscuous mode [ 2619.237552][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2619.288886][T24743] device bridge_slave_1 left promiscuous mode [ 2619.295053][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2619.348600][T24743] device bridge_slave_0 left promiscuous mode [ 2619.354794][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2619.411152][T24743] device bridge_slave_1 left promiscuous mode [ 2619.417646][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2619.488410][T24743] device bridge_slave_0 left promiscuous mode [ 2619.494583][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2623.650305][T24743] device hsr_slave_1 left promiscuous mode [ 2623.691768][T24743] device hsr_slave_0 left promiscuous mode [ 2623.751321][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2623.764021][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2623.775469][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2623.823800][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2623.897181][T24743] bond0 (unregistering): Released all slaves [ 2624.049990][T24743] device hsr_slave_1 left promiscuous mode [ 2624.104075][T24743] device hsr_slave_0 left promiscuous mode [ 2624.171084][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2624.183734][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2624.194899][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2624.253533][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2624.342743][T24743] bond0 (unregistering): Released all slaves [ 2624.499690][T24743] device hsr_slave_1 left promiscuous mode [ 2624.552475][T24743] device hsr_slave_0 left promiscuous mode [ 2624.613866][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2624.625173][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2624.635966][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2624.665058][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2624.746888][T24743] bond0 (unregistering): Released all slaves [ 2624.876680][T25719] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2624.887570][T25719] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2624.902662][T25716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2624.921915][T25719] team0: Port device team_slave_0 added [ 2624.929491][T25719] team0: Port device team_slave_1 added [ 2624.979303][T25719] device hsr_slave_0 entered promiscuous mode [ 2625.017759][T25719] device hsr_slave_1 entered promiscuous mode [ 2625.088876][T25716] 8021q: adding VLAN 0 to HW filter on device team0 [ 2625.098197][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2625.106125][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2625.132914][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2625.142154][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2625.150935][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2625.158031][T17975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2625.229596][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2625.238598][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2625.246868][T21874] bridge0: port 2(bridge_slave_1) entered blocking state [ 2625.253968][T21874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2625.262348][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2625.271222][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2625.279735][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2625.289608][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2625.298108][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2625.306753][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2625.315939][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2625.340318][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2625.349174][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2625.357353][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2625.366341][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2625.380179][T25716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2625.402876][T25719] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2625.418287][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2625.426030][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2625.434145][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2625.444650][T25719] 8021q: adding VLAN 0 to HW filter on device team0 [ 2625.456840][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2625.465511][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2625.473930][T29950] bridge0: port 1(bridge_slave_0) entered blocking state [ 2625.481037][T29950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2625.490310][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2625.505619][T25716] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2625.515016][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2625.526172][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2625.540509][T29950] bridge0: port 2(bridge_slave_1) entered blocking state [ 2625.547708][T29950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2625.555440][T29950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2625.623730][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2625.632845][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2625.641832][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2625.651660][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2625.741894][T25719] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2625.758245][T25719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2625.780909][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2625.830234][T25719] 8021q: adding VLAN 0 to HW filter on device batadv0 03:14:52 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:52 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:52 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:52 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:52 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:52 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:52 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:52 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:52 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) 03:14:53 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:53 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:53 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:53 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2628.680038][T25785] IPVS: ftp: loaded support on port[0] = 21 [ 2628.739971][T25785] chnl_net:caif_netlink_parms(): no params data found [ 2628.770509][T25785] bridge0: port 1(bridge_slave_0) entered blocking state [ 2628.778053][T25785] bridge0: port 1(bridge_slave_0) entered disabled state [ 2628.785724][T25785] device bridge_slave_0 entered promiscuous mode [ 2628.793511][T25785] bridge0: port 2(bridge_slave_1) entered blocking state [ 2628.800777][T25785] bridge0: port 2(bridge_slave_1) entered disabled state [ 2628.808533][T25785] device bridge_slave_1 entered promiscuous mode [ 2628.825993][T25785] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2628.836599][T25785] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2628.854716][T25785] team0: Port device team_slave_0 added [ 2628.863045][T25785] team0: Port device team_slave_1 added [ 2628.929297][T25785] device hsr_slave_0 entered promiscuous mode [ 2628.987796][T25785] device hsr_slave_1 entered promiscuous mode [ 2629.263647][T25785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2629.377050][T25785] 8021q: adding VLAN 0 to HW filter on device team0 [ 2629.386494][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2629.394393][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2629.509205][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2629.518100][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2629.526414][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2629.533519][T17975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2629.541265][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2629.550894][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2629.559436][T17975] bridge0: port 2(bridge_slave_1) entered blocking state [ 2629.568444][T17975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2629.576603][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2629.586884][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2629.594862][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2629.708182][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2629.717176][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2629.732554][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2629.848130][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2629.858469][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2629.866819][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2629.878994][T25785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2630.002889][T25785] 8021q: adding VLAN 0 to HW filter on device batadv0 03:14:56 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:56 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r2 = creat(0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x45c0000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x1c, 0x0, 0x21, 0x70bd2b, 0x25dfdbff}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000080)) 03:14:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:56 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:56 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 03:14:56 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:56 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:56 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:56 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:57 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:57 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:14:58 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:14:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:14:58 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) r1 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpgid(0x0) renameat2(r0, 0x0, r0, 0x0, 0x4) getpgid(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20002, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) move_pages(r1, 0x3, &(0x7f0000000100)=[&(0x7f00005f8000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000d97000/0x2000)=nil], &(0x7f0000000700)=[0x673daee5, 0x1f, 0x2], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6) getresgid(0x0, 0x0, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r0, 0x10, &(0x7f00000003c0)={&(0x7f0000000300)=""/164, 0xa4, 0xffffffffffffffff}}, 0x10) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580)='trusted.overlay.upper\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x114, 0x3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r2, 0x10, &(0x7f0000000440)={&(0x7f0000000280)=""/29, 0x1d, r4}}, 0x10) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_REGS(r6, 0x8090ae81, &(0x7f00000004c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f000030c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f00002ab000/0x4000)=nil, &(0x7f0000f92000/0x1000)=nil], &(0x7f0000000040)=[0x1, 0x7, 0x1, 0x7fffffff], &(0x7f0000000080)=[0x0, 0x0], 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @empty}, @in=@remote}}, {{@in=@dev}, 0x0, @in=@initdev}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 2632.009460][T24743] device bridge_slave_1 left promiscuous mode [ 2632.020466][T24743] bridge0: port 2(bridge_slave_1) entered disabled state 03:14:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') [ 2632.138582][T24743] device bridge_slave_0 left promiscuous mode [ 2632.144818][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2632.225145][T24743] device bridge_slave_1 left promiscuous mode [ 2632.236022][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2632.339160][T24743] device bridge_slave_0 left promiscuous mode [ 2632.355623][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2635.280390][T24743] device hsr_slave_1 left promiscuous mode [ 2635.332816][T24743] device hsr_slave_0 left promiscuous mode [ 2635.392743][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2635.404154][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2635.415558][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2635.453003][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2635.519624][T24743] bond0 (unregistering): Released all slaves [ 2635.671061][T24743] device hsr_slave_1 left promiscuous mode [ 2635.712542][T24743] device hsr_slave_0 left promiscuous mode [ 2635.752599][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2635.763722][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2635.775203][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2635.811595][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2635.877253][T24743] bond0 (unregistering): Released all slaves [ 2636.097226][T25863] IPVS: ftp: loaded support on port[0] = 21 [ 2636.097339][T25866] IPVS: ftp: loaded support on port[0] = 21 [ 2636.240331][T25863] chnl_net:caif_netlink_parms(): no params data found [ 2636.274037][T25863] bridge0: port 1(bridge_slave_0) entered blocking state [ 2636.274137][T25863] bridge0: port 1(bridge_slave_0) entered disabled state [ 2636.290493][T25863] device bridge_slave_0 entered promiscuous mode [ 2636.310529][T25863] bridge0: port 2(bridge_slave_1) entered blocking state [ 2636.319013][T25863] bridge0: port 2(bridge_slave_1) entered disabled state [ 2636.326704][T25863] device bridge_slave_1 entered promiscuous mode [ 2636.367727][T25863] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2636.380114][T25866] chnl_net:caif_netlink_parms(): no params data found [ 2636.391428][T25863] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2636.416724][T25863] team0: Port device team_slave_0 added [ 2636.423976][T25863] team0: Port device team_slave_1 added [ 2636.490437][T25863] device hsr_slave_0 entered promiscuous mode [ 2636.547912][T25863] device hsr_slave_1 entered promiscuous mode [ 2636.735424][T25866] bridge0: port 1(bridge_slave_0) entered blocking state [ 2636.748942][T25866] bridge0: port 1(bridge_slave_0) entered disabled state [ 2636.757013][T25866] device bridge_slave_0 entered promiscuous mode [ 2636.772599][T25863] bridge0: port 2(bridge_slave_1) entered blocking state [ 2636.779736][T25863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2636.787684][T25863] bridge0: port 1(bridge_slave_0) entered blocking state [ 2636.795130][T25863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2636.804678][T25866] bridge0: port 2(bridge_slave_1) entered blocking state [ 2636.816906][T25866] bridge0: port 2(bridge_slave_1) entered disabled state [ 2636.825266][T25866] device bridge_slave_1 entered promiscuous mode [ 2636.860461][T25866] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2636.876975][T25866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2636.907147][T25866] team0: Port device team_slave_0 added [ 2636.921490][T25866] team0: Port device team_slave_1 added [ 2637.040311][T25866] device hsr_slave_0 entered promiscuous mode [ 2637.087927][T25866] device hsr_slave_1 entered promiscuous mode [ 2637.159854][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2637.178137][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2637.230992][T25863] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2637.269223][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2637.277159][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2637.293730][T25863] 8021q: adding VLAN 0 to HW filter on device team0 [ 2637.326283][T25866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2637.341402][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2637.354180][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2637.367326][T17975] bridge0: port 1(bridge_slave_0) entered blocking state [ 2637.374506][T17975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2637.407096][T25866] 8021q: adding VLAN 0 to HW filter on device team0 [ 2637.414904][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2637.424698][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2637.435815][T21876] bridge0: port 2(bridge_slave_1) entered blocking state [ 2637.443189][T21876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2637.453353][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2637.462055][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2637.471013][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2637.480353][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2637.489553][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2637.498728][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2637.508465][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2637.516924][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2637.525379][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2637.533920][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2637.542711][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2637.550724][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2637.561614][T25863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2637.573321][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2637.586975][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2637.596468][T18109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2637.613433][T18109] bridge0: port 1(bridge_slave_0) entered blocking state [ 2637.620604][T18109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2637.629681][T22000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2637.662563][T25863] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2637.685357][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2637.695753][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2637.705626][T17975] bridge0: port 2(bridge_slave_1) entered blocking state [ 2637.713045][T17975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2637.731714][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2637.740918][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2637.759172][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2637.779246][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2637.796913][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2637.819183][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2637.835282][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2637.844525][T21876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2637.862716][T25866] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2637.875960][T25866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2637.893646][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2637.924911][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2637.939083][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2638.018970][T25866] 8021q: adding VLAN 0 to HW filter on device batadv0 03:15:04 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 03:15:04 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:04 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:04 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:15:04 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:04 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read'}}]}}) syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:04 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x30, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') close(r0) preadv(r1, &(0x7f0000000200), 0x2a3, 0x0) 03:15:04 executing program 3: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = gettid() mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x18}, 0x18) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0) tkill(r0, 0x13) read$FUSE(r4, &(0x7f0000007380), 0x1000) [ 2638.841049][ T27] audit: type=1804 audit(1561950904.879:1575): pid=25907 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir374457039/syzkaller.SjebtN/14/file0" dev="sda1" ino=17154 res=1 03:15:05 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:05 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 03:15:05 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) fadvise64(r0, 0x0, 0xe8, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:05 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2639.556602][ T27] audit: type=1804 audit(1561950905.589:1576): pid=25905 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir374457039/syzkaller.SjebtN/14/file0" dev="sda1" ino=17154 res=1 03:15:05 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:05 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2639.715216][ T27] audit: type=1804 audit(1561950905.619:1577): pid=25905 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir374457039/syzkaller.SjebtN/14/file0" dev="sda1" ino=17154 res=1 [ 2640.631169][T25925] IPVS: ftp: loaded support on port[0] = 21 [ 2640.880102][T25925] chnl_net:caif_netlink_parms(): no params data found [ 2641.158463][T25925] bridge0: port 1(bridge_slave_0) entered blocking state [ 2641.162126][T25928] IPVS: ftp: loaded support on port[0] = 21 [ 2641.165625][T25925] bridge0: port 1(bridge_slave_0) entered disabled state [ 2641.181128][T25925] device bridge_slave_0 entered promiscuous mode [ 2641.472847][T25925] bridge0: port 2(bridge_slave_1) entered blocking state [ 2641.480080][T25925] bridge0: port 2(bridge_slave_1) entered disabled state [ 2641.488083][T25925] device bridge_slave_1 entered promiscuous mode [ 2641.510303][T25931] IPVS: ftp: loaded support on port[0] = 21 [ 2641.538014][T25932] IPVS: ftp: loaded support on port[0] = 21 [ 2641.741593][T25925] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2641.757033][T25925] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2642.021341][T25925] team0: Port device team_slave_0 added [ 2642.044371][T25925] team0: Port device team_slave_1 added [ 2642.559307][T25925] device hsr_slave_0 entered promiscuous mode [ 2642.608009][T25925] device hsr_slave_1 entered promiscuous mode [ 2642.653704][T25928] chnl_net:caif_netlink_parms(): no params data found [ 2642.942068][T25928] bridge0: port 1(bridge_slave_0) entered blocking state [ 2642.950453][T25928] bridge0: port 1(bridge_slave_0) entered disabled state [ 2642.958638][T25928] device bridge_slave_0 entered promiscuous mode [ 2642.971132][T25932] chnl_net:caif_netlink_parms(): no params data found [ 2642.992464][T25928] bridge0: port 2(bridge_slave_1) entered blocking state [ 2642.999815][T25928] bridge0: port 2(bridge_slave_1) entered disabled state [ 2643.008016][T25928] device bridge_slave_1 entered promiscuous mode [ 2643.044323][T25931] chnl_net:caif_netlink_parms(): no params data found [ 2643.066044][T25928] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2643.075273][T24743] device bridge_slave_1 left promiscuous mode [ 2643.082167][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2643.128600][T24743] device bridge_slave_0 left promiscuous mode [ 2643.134779][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2643.169684][T24743] device bridge_slave_1 left promiscuous mode [ 2643.175855][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2643.218330][T24743] device bridge_slave_0 left promiscuous mode [ 2643.224486][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2643.269757][T24743] device bridge_slave_1 left promiscuous mode [ 2643.275908][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2643.329417][T24743] device bridge_slave_0 left promiscuous mode [ 2643.335588][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2643.398902][T24743] device bridge_slave_1 left promiscuous mode [ 2643.405059][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2643.468277][T24743] device bridge_slave_0 left promiscuous mode [ 2643.474429][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2649.159452][T24743] device hsr_slave_1 left promiscuous mode [ 2649.213822][T24743] device hsr_slave_0 left promiscuous mode [ 2649.263106][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2649.274227][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2649.285988][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2649.323989][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2649.386668][T24743] bond0 (unregistering): Released all slaves [ 2649.549797][T24743] device hsr_slave_1 left promiscuous mode [ 2649.602545][T24743] device hsr_slave_0 left promiscuous mode [ 2649.663206][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2649.684023][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2649.695229][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2649.741725][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2649.818928][T24743] bond0 (unregistering): Released all slaves [ 2649.989629][T24743] device hsr_slave_1 left promiscuous mode [ 2650.050696][T24743] device hsr_slave_0 left promiscuous mode [ 2650.091226][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2650.103688][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2650.114744][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2650.171096][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2650.263209][T24743] bond0 (unregistering): Released all slaves [ 2650.390799][T24743] device hsr_slave_1 left promiscuous mode [ 2650.432761][T24743] device hsr_slave_0 left promiscuous mode [ 2650.492078][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2650.503560][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2650.514708][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2650.573678][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2650.669497][T24743] bond0 (unregistering): Released all slaves [ 2650.784320][T25928] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2650.807989][T25932] bridge0: port 1(bridge_slave_0) entered blocking state [ 2650.815109][T25932] bridge0: port 1(bridge_slave_0) entered disabled state [ 2650.823668][T25932] device bridge_slave_0 entered promiscuous mode [ 2650.832723][T25932] bridge0: port 2(bridge_slave_1) entered blocking state [ 2650.840335][T25932] bridge0: port 2(bridge_slave_1) entered disabled state [ 2650.849404][T25932] device bridge_slave_1 entered promiscuous mode [ 2650.889995][T25931] bridge0: port 1(bridge_slave_0) entered blocking state [ 2650.897213][T25931] bridge0: port 1(bridge_slave_0) entered disabled state [ 2650.906398][T25931] device bridge_slave_0 entered promiscuous mode [ 2650.922631][T25932] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2650.935009][T25932] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2650.944793][T25928] team0: Port device team_slave_0 added [ 2650.951262][T25931] bridge0: port 2(bridge_slave_1) entered blocking state [ 2650.958989][T25931] bridge0: port 2(bridge_slave_1) entered disabled state [ 2650.966644][T25931] device bridge_slave_1 entered promiscuous mode [ 2650.987930][T25928] team0: Port device team_slave_1 added [ 2651.027980][T25931] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2651.037740][T25932] team0: Port device team_slave_0 added [ 2651.080417][T25928] device hsr_slave_0 entered promiscuous mode [ 2651.128004][T25928] device hsr_slave_1 entered promiscuous mode [ 2651.198986][T25932] team0: Port device team_slave_1 added [ 2651.211027][T25931] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2651.248327][T25931] team0: Port device team_slave_0 added [ 2651.255709][T25931] team0: Port device team_slave_1 added [ 2651.319354][T25931] device hsr_slave_0 entered promiscuous mode [ 2651.368123][T25931] device hsr_slave_1 entered promiscuous mode [ 2651.470427][T25932] device hsr_slave_0 entered promiscuous mode [ 2651.508188][T25932] device hsr_slave_1 entered promiscuous mode [ 2651.581952][T25925] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2651.593016][T25931] bridge0: port 2(bridge_slave_1) entered blocking state [ 2651.600184][T25931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2651.607590][T25931] bridge0: port 1(bridge_slave_0) entered blocking state [ 2651.614681][T25931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2651.674761][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2651.682468][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2651.694991][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2651.702680][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2651.720468][T25925] 8021q: adding VLAN 0 to HW filter on device team0 [ 2651.751431][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2651.760368][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2651.769451][T21874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2651.776508][T21874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2651.784863][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2651.804096][T25932] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2651.814889][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2651.828973][T25931] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2651.840337][T25928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2651.854895][T25932] 8021q: adding VLAN 0 to HW filter on device team0 [ 2651.862969][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2651.872161][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2651.881067][T21999] bridge0: port 2(bridge_slave_1) entered blocking state [ 2651.888381][T21999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2651.895957][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2651.904549][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2651.917579][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2651.926865][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2651.935963][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2651.944995][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2651.972954][T25928] 8021q: adding VLAN 0 to HW filter on device team0 [ 2651.982602][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2651.991492][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2652.000636][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2652.009606][T21874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2652.016675][T21874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2652.024711][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2652.033525][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2652.042070][T21874] bridge0: port 2(bridge_slave_1) entered blocking state [ 2652.049795][T21874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2652.057625][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2652.066225][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2652.075307][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2652.083486][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2652.104757][T25931] 8021q: adding VLAN 0 to HW filter on device team0 [ 2652.119263][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2652.127177][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2652.135985][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2652.144538][T21874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2652.151652][T21874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2652.159871][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2652.169168][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2652.177640][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2652.186244][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2652.194773][T21874] bridge0: port 2(bridge_slave_1) entered blocking state [ 2652.201874][T21874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2652.210862][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2652.219504][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2652.228016][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2652.236032][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2652.244034][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2652.252423][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2652.260833][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2652.269924][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2652.279127][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2652.287621][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2652.296217][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2652.304391][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2652.317712][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2652.326458][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2652.390816][T25932] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2652.402877][T25932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2652.415639][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2652.424332][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2652.433082][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2652.443103][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2652.452150][T22123] bridge0: port 1(bridge_slave_0) entered blocking state [ 2652.459273][T22123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2652.466852][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2652.475392][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2652.486504][T25925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2652.637798][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2652.646823][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2652.656279][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2652.666258][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2652.676369][T21874] bridge0: port 2(bridge_slave_1) entered blocking state [ 2652.683519][T21874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2652.692361][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2652.701739][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2652.711285][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2652.720526][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2652.756362][T25931] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2652.767869][T25931] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2652.784135][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2652.797055][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2652.806360][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2652.815872][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2652.825389][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2652.834698][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2652.844009][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2652.853332][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2652.862905][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2652.871886][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2652.882018][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2652.891225][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2652.902530][T25932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2652.918224][T25925] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2652.941404][T25928] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2652.958837][T25928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2652.989195][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2653.019782][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2653.035193][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2653.054971][T25931] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2653.109577][T25928] 8021q: adding VLAN 0 to HW filter on device batadv0 03:15:19 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:15:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) [ 2653.523918][T25971] bond0: Releasing backup interface bond_slave_1 03:15:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x40000) 03:15:19 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:19 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:19 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') 03:15:20 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5, 0x0, 0xffffffffffffffdd, 0x3}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:20 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:20 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) read(r0, &(0x7f00000028c0)=""/384, 0x180) signalfd(r0, &(0x7f0000432ff8)={0xfffffffffffffffe}, 0x8) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00009fd000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 03:15:20 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:20 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:20 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:15:20 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$unix(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, r0]}}, @rights={{0x20, 0x1, 0x1, [r2, 0xffffffffffffffff, r1, r2]}}, @rights={{0x18, 0x1, 0x1, [r1, r1]}}], 0x70, 0x8000}, 0x48d0) 03:15:20 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:20 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) read(r0, &(0x7f00000028c0)=""/384, 0x180) signalfd(r0, &(0x7f0000432ff8)={0xfffffffffffffffe}, 0x8) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00009fd000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 03:15:20 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:20 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:21 executing program 5: madvise(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x10000000000000ca) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0xcb) 03:15:21 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:21 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:15:21 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2f}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x1c, 0x0, 0x3000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, 0x0) 03:15:21 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:21 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x1}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) syz_emit_ethernet(0x423, &(0x7f0000000240)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) 03:15:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = memfd_create(&(0x7f0000000140)='\xd7', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 03:15:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:21 executing program 5: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$P9_RWSTAT(r0, &(0x7f0000000180)={0x7}, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(0x0, 0x0, 0x0, 0x0) [ 2655.583484][T26052] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.3 proc:/self/fd/3' not defined. 03:15:21 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0xe8, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:22 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x10009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000280)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 03:15:22 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) [ 2657.596729][T26100] IPVS: ftp: loaded support on port[0] = 21 [ 2657.855199][T26100] chnl_net:caif_netlink_parms(): no params data found [ 2657.881348][T26100] bridge0: port 1(bridge_slave_0) entered blocking state [ 2657.889478][T26100] bridge0: port 1(bridge_slave_0) entered disabled state [ 2657.898128][T26100] device bridge_slave_0 entered promiscuous mode [ 2658.041057][T26100] bridge0: port 2(bridge_slave_1) entered blocking state [ 2658.050809][T26100] bridge0: port 2(bridge_slave_1) entered disabled state [ 2658.059135][T26100] device bridge_slave_1 entered promiscuous mode [ 2658.078519][T26100] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2658.082476][T26103] IPVS: ftp: loaded support on port[0] = 21 [ 2658.095583][T26100] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2658.222896][T26100] team0: Port device team_slave_0 added [ 2658.234378][T26100] team0: Port device team_slave_1 added [ 2658.399382][T26100] device hsr_slave_0 entered promiscuous mode [ 2658.447965][T26100] device hsr_slave_1 entered promiscuous mode [ 2658.613984][T26100] bridge0: port 2(bridge_slave_1) entered blocking state [ 2658.621140][T26100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2658.628528][T26100] bridge0: port 1(bridge_slave_0) entered blocking state [ 2658.635596][T26100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2658.803762][T17975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2658.812363][T17975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2658.931892][T26103] chnl_net:caif_netlink_parms(): no params data found [ 2658.968730][T26103] bridge0: port 1(bridge_slave_0) entered blocking state [ 2658.975872][T26103] bridge0: port 1(bridge_slave_0) entered disabled state [ 2658.984332][T26103] device bridge_slave_0 entered promiscuous mode [ 2658.993058][T26103] bridge0: port 2(bridge_slave_1) entered blocking state [ 2659.000387][T26103] bridge0: port 2(bridge_slave_1) entered disabled state [ 2659.008368][T26103] device bridge_slave_1 entered promiscuous mode [ 2659.028345][T26103] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2659.145139][T26103] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2659.168884][T26103] team0: Port device team_slave_0 added [ 2659.176073][T26103] team0: Port device team_slave_1 added [ 2659.350168][T26103] device hsr_slave_0 entered promiscuous mode [ 2659.378663][T26103] device hsr_slave_1 entered promiscuous mode [ 2659.420141][T24743] device bridge_slave_1 left promiscuous mode [ 2659.426720][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2659.498376][T24743] device bridge_slave_0 left promiscuous mode [ 2659.504607][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2659.558969][T24743] device bridge_slave_1 left promiscuous mode [ 2659.565186][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2659.608872][T24743] device bridge_slave_0 left promiscuous mode [ 2659.615066][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2662.430627][T24743] device hsr_slave_1 left promiscuous mode [ 2662.474472][T24743] device hsr_slave_0 left promiscuous mode [ 2662.511110][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2662.523983][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2662.535471][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2662.571953][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2662.663611][T24743] bond0 (unregistering): Released all slaves [ 2662.780815][T24743] device hsr_slave_1 left promiscuous mode [ 2662.824081][T24743] device hsr_slave_0 left promiscuous mode [ 2662.870835][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2662.881887][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2662.893865][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2662.953845][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2663.041386][T24743] bond0 (unregistering): Released all slaves [ 2663.157309][T26100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2663.175708][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2663.183713][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2663.193427][T26100] 8021q: adding VLAN 0 to HW filter on device team0 [ 2663.213085][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2663.222417][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2663.230936][T21874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2663.237998][T21874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2663.254745][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2663.263694][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2663.272321][T22123] bridge0: port 2(bridge_slave_1) entered blocking state [ 2663.279465][T22123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2663.287263][T22123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2663.312540][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2663.323164][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2663.334643][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2663.343119][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2663.352060][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2663.360566][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2663.368766][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2663.377467][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2663.390467][T26100] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2663.402059][T26100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2663.413011][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2663.421938][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2663.448409][T26100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2663.468432][T26103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2663.492979][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2663.501352][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 03:15:29 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) [ 2663.561264][T26103] 8021q: adding VLAN 0 to HW filter on device team0 [ 2663.633646][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2663.643651][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2663.658335][T21999] bridge0: port 1(bridge_slave_0) entered blocking state [ 2663.665403][T21999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2663.679660][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2663.691907][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2663.702846][T21999] bridge0: port 2(bridge_slave_1) entered blocking state [ 2663.709970][T21999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2663.723582][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2663.732623][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2664.050181][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2664.058608][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2664.067301][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2664.081538][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2664.093797][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2664.109418][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2664.121561][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2664.134613][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2664.146886][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2664.163703][T26103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2664.174596][T21999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2664.209935][T26103] 8021q: adding VLAN 0 to HW filter on device batadv0 03:15:30 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:15:30 executing program 5: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$P9_RWSTAT(r0, &(0x7f0000000180)={0x7}, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 03:15:30 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:30 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:30 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x10009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000280)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 03:15:30 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:30 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:30 executing program 5: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$P9_RWSTAT(r0, &(0x7f0000000180)={0x7}, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 03:15:31 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:31 executing program 3: 03:15:31 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:31 executing program 3: 03:15:31 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:15:31 executing program 3: 03:15:31 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:31 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:31 executing program 5: [ 2667.203435][T26185] IPVS: ftp: loaded support on port[0] = 21 [ 2667.363497][T26185] chnl_net:caif_netlink_parms(): no params data found [ 2667.391866][T26185] bridge0: port 1(bridge_slave_0) entered blocking state [ 2667.399188][T26185] bridge0: port 1(bridge_slave_0) entered disabled state [ 2667.406829][T26185] device bridge_slave_0 entered promiscuous mode [ 2667.515299][T26185] bridge0: port 2(bridge_slave_1) entered blocking state [ 2667.523165][T26185] bridge0: port 2(bridge_slave_1) entered disabled state [ 2667.530938][T26185] device bridge_slave_1 entered promiscuous mode [ 2667.549849][T26185] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2667.560987][T26185] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2667.681286][T26185] team0: Port device team_slave_0 added [ 2667.688288][T26185] team0: Port device team_slave_1 added [ 2667.729375][T26185] device hsr_slave_0 entered promiscuous mode [ 2667.817996][T26185] device hsr_slave_1 entered promiscuous mode [ 2668.004465][T26185] bridge0: port 2(bridge_slave_1) entered blocking state [ 2668.011774][T26185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2668.019192][T26185] bridge0: port 1(bridge_slave_0) entered blocking state [ 2668.026245][T26185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2668.163521][T26185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2668.175262][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2668.184121][T19344] bridge0: port 1(bridge_slave_0) entered disabled state [ 2668.192493][T19344] bridge0: port 2(bridge_slave_1) entered disabled state [ 2668.201549][T19344] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2668.316379][T26185] 8021q: adding VLAN 0 to HW filter on device team0 [ 2668.328259][T21874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2668.336849][T21874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2668.343987][T21874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2668.354539][T24743] device bridge_slave_1 left promiscuous mode [ 2668.361038][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2668.408658][T24743] device bridge_slave_0 left promiscuous mode [ 2668.414821][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2668.468813][T24743] device bridge_slave_1 left promiscuous mode [ 2668.474975][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2668.518706][T24743] device bridge_slave_0 left promiscuous mode [ 2668.524861][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2671.260552][T24743] device hsr_slave_1 left promiscuous mode [ 2671.302751][T24743] device hsr_slave_0 left promiscuous mode [ 2671.372269][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2671.385343][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2671.396554][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2671.422016][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2671.506461][T24743] bond0 (unregistering): Released all slaves [ 2671.652292][T24743] device hsr_slave_1 left promiscuous mode [ 2671.720989][T24743] device hsr_slave_0 left promiscuous mode [ 2671.774163][T24743] team0 (unregistering): Port device team_slave_1 removed [ 2671.785986][T24743] team0 (unregistering): Port device team_slave_0 removed [ 2671.797095][T24743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2671.834073][T24743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2671.919550][T24743] bond0 (unregistering): Released all slaves [ 2672.070042][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2672.079099][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2672.087467][T21704] bridge0: port 2(bridge_slave_1) entered blocking state [ 2672.094693][T21704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2672.102501][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2672.112056][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2672.120939][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2672.129968][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2672.139050][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2672.151470][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2672.160057][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2672.173034][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2672.181786][T21704] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2672.194278][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2672.203292][T17975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2672.214000][T26185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2672.234339][T26185] 8021q: adding VLAN 0 to HW filter on device batadv0 03:15:38 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:38 executing program 3: 03:15:38 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') 03:15:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) userfaultfd(0x0) io_setup(0x41, &(0x7f00000006c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x800000000005, 0x0, r0, 0x0}]) 03:15:38 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:38 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) 03:15:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3f) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in=@broadcast}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}}, {{@in6=@empty, 0x4d7}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 2672.449746][T26200] [ 2672.452114][T26200] ===================================================== [ 2672.459049][T26200] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 2672.466504][T26200] 5.2.0-rc7 #12 Not tainted [ 2672.471090][T26200] ----------------------------------------------------- [ 2672.478027][T26200] syz-executor.5/26200 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 2672.486092][T26200] 000000003abd1f06 (&ctx->fd_wqh){....}, at: io_submit_one+0x1167/0x1ac0 [ 2672.497688][T26200] [ 2672.497688][T26200] and this task is already holding: [ 2672.505238][T26200] 00000000ac35a6e3 (&(&ctx->ctx_lock)->rlock){..-.}, at: io_submit_one+0x1137/0x1ac0 [ 2672.514754][T26200] which would create a new lock dependency: [ 2672.520639][T26200] (&(&ctx->ctx_lock)->rlock){..-.} -> (&ctx->fd_wqh){....} [ 2672.527922][T26200] [ 2672.527922][T26200] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 2672.538363][T26200] (&(&ctx->ctx_lock)->rlock){..-.} [ 2672.538373][T26200] [ 2672.538373][T26200] ... which became SOFTIRQ-irq-safe at: [ 2672.551296][T26200] _raw_spin_lock_irq+0x6a/0x80 [ 2672.556231][T26200] free_ioctx_users+0x33/0x1d0 [ 2672.561092][T26200] percpu_ref_put+0x1c6/0x1d0 [ 2672.565847][T26200] percpu_ref_switch_to_atomic_rcu+0x260/0x310 [ 2672.572099][T26200] rcu_core+0x8d6/0xf90 [ 2672.576336][T26200] __do_softirq+0x340/0x7b0 [ 2672.580925][T26200] run_ksoftirqd+0x64/0xf0 [ 2672.585423][T26200] smpboot_thread_fn+0x62c/0xa50 [ 2672.590448][T26200] kthread+0x325/0x350 [ 2672.594598][T26200] ret_from_fork+0x24/0x30 [ 2672.599088][T26200] [ 2672.599088][T26200] to a SOFTIRQ-irq-unsafe lock: [ 2672.606097][T26200] (&ctx->fault_pending_wqh){+.+.} [ 2672.606106][T26200] [ 2672.606106][T26200] ... which became SOFTIRQ-irq-unsafe at: [ 2672.619164][T26200] ... [ 2672.619194][T26200] _raw_spin_lock+0x2d/0x40 [ 2672.626362][T26200] userfaultfd_release+0x4dc/0x620 [ 2672.631565][T26200] __fput+0x2e4/0x740 [ 2672.635655][T26200] ____fput+0x15/0x20 [ 2672.639723][T26200] task_work_run+0x17e/0x1b0 [ 2672.644402][T26200] prepare_exit_to_usermode+0x402/0x4f0 [ 2672.650031][T26200] syscall_return_slowpath+0x110/0x440 [ 2672.655572][T26200] do_syscall_64+0x126/0x140 [ 2672.660245][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2672.666218][T26200] [ 2672.666218][T26200] other info that might help us debug this: [ 2672.666218][T26200] [ 2672.678000][T26200] Chain exists of: [ 2672.678000][T26200] &(&ctx->ctx_lock)->rlock --> &ctx->fd_wqh --> &ctx->fault_pending_wqh [ 2672.678000][T26200] [ 2672.692239][T26200] Possible interrupt unsafe locking scenario: [ 2672.692239][T26200] [ 2672.700557][T26200] CPU0 CPU1 [ 2672.705915][T26200] ---- ---- [ 2672.711269][T26200] lock(&ctx->fault_pending_wqh); [ 2672.716373][T26200] local_irq_disable(); [ 2672.723136][T26200] lock(&(&ctx->ctx_lock)->rlock); [ 2672.730851][T26200] lock(&ctx->fd_wqh); [ 2672.737530][T26200] [ 2672.741156][T26200] lock(&(&ctx->ctx_lock)->rlock); [ 2672.746519][T26200] [ 2672.746519][T26200] *** DEADLOCK *** [ 2672.746519][T26200] [ 2672.754671][T26200] 1 lock held by syz-executor.5/26200: [ 2672.760121][T26200] #0: 00000000ac35a6e3 (&(&ctx->ctx_lock)->rlock){..-.}, at: io_submit_one+0x1137/0x1ac0 [ 2672.770032][T26200] [ 2672.770032][T26200] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 2672.780454][T26200] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 2672.786007][T26200] IN-SOFTIRQ-W at: [ 2672.790037][T26200] _raw_spin_lock_irq+0x6a/0x80 [ 2672.796549][T26200] free_ioctx_users+0x33/0x1d0 [ 2672.803929][T26200] percpu_ref_put+0x1c6/0x1d0 [ 2672.810258][T26200] percpu_ref_switch_to_atomic_rcu+0x260/0x310 [ 2672.818155][T26200] rcu_core+0x8d6/0xf90 [ 2672.823969][T26200] __do_softirq+0x340/0x7b0 [ 2672.830120][T26200] run_ksoftirqd+0x64/0xf0 [ 2672.836195][T26200] smpboot_thread_fn+0x62c/0xa50 [ 2672.842778][T26200] kthread+0x325/0x350 [ 2672.848493][T26200] ret_from_fork+0x24/0x30 [ 2672.854552][T26200] INITIAL USE at: [ 2672.858473][T26200] _raw_spin_lock_irq+0x6a/0x80 [ 2672.864885][T26200] free_ioctx_users+0x33/0x1d0 [ 2672.871212][T26200] percpu_ref_put+0x1c6/0x1d0 [ 2672.877468][T26200] percpu_ref_switch_to_atomic_rcu+0x260/0x310 [ 2672.885175][T26200] rcu_core+0x8d6/0xf90 [ 2672.890887][T26200] __do_softirq+0x340/0x7b0 [ 2672.896948][T26200] run_ksoftirqd+0x64/0xf0 [ 2672.902924][T26200] smpboot_thread_fn+0x62c/0xa50 [ 2672.909419][T26200] kthread+0x325/0x350 [ 2672.915048][T26200] ret_from_fork+0x24/0x30 [ 2672.921019][T26200] } [ 2672.923573][T26200] ... key at: [] ioctx_alloc.__key+0x0/0x10 [ 2672.931535][T26200] ... acquired at: [ 2672.935339][T26200] _raw_spin_lock+0x2d/0x40 [ 2672.940010][T26200] io_submit_one+0x1167/0x1ac0 [ 2672.944936][T26200] __se_sys_io_submit+0x18f/0x2d0 [ 2672.950122][T26200] __x64_sys_io_submit+0x7b/0x90 [ 2672.955232][T26200] do_syscall_64+0xfe/0x140 [ 2672.959998][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2672.966045][T26200] [ 2672.968368][T26200] [ 2672.968368][T26200] the dependencies between the lock to be acquired [ 2672.968372][T26200] and SOFTIRQ-irq-unsafe lock: [ 2672.981877][T26200] -> (&ctx->fault_pending_wqh){+.+.} { [ 2672.987418][T26200] HARDIRQ-ON-W at: [ 2672.991526][T26200] _raw_spin_lock+0x2d/0x40 [ 2672.997941][T26200] userfaultfd_release+0x4dc/0x620 [ 2673.004878][T26200] __fput+0x2e4/0x740 [ 2673.010679][T26200] ____fput+0x15/0x20 [ 2673.016480][T26200] task_work_run+0x17e/0x1b0 [ 2673.022897][T26200] prepare_exit_to_usermode+0x402/0x4f0 [ 2673.030267][T26200] syscall_return_slowpath+0x110/0x440 [ 2673.037550][T26200] do_syscall_64+0x126/0x140 [ 2673.043962][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.051672][T26200] SOFTIRQ-ON-W at: [ 2673.055746][T26200] _raw_spin_lock+0x2d/0x40 [ 2673.062066][T26200] userfaultfd_release+0x4dc/0x620 [ 2673.068999][T26200] __fput+0x2e4/0x740 [ 2673.074797][T26200] ____fput+0x15/0x20 [ 2673.080609][T26200] task_work_run+0x17e/0x1b0 [ 2673.087031][T26200] prepare_exit_to_usermode+0x402/0x4f0 [ 2673.094401][T26200] syscall_return_slowpath+0x110/0x440 [ 2673.100706][T26199] kobject: '0:38' (00000000e73b0fbe): kobject_add_internal: parent: 'bdi', set: 'devices' [ 2673.101685][T26200] do_syscall_64+0x126/0x140 [ 2673.101699][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.101717][T26200] INITIAL USE at: [ 2673.126651][T26199] kobject: '0:38' (00000000e73b0fbe): kobject_uevent_env [ 2673.129710][T26200] _raw_spin_lock+0x2d/0x40 [ 2673.129723][T26200] userfaultfd_release+0x4dc/0x620 [ 2673.129732][T26200] __fput+0x2e4/0x740 [ 2673.129738][T26200] ____fput+0x15/0x20 [ 2673.129747][T26200] task_work_run+0x17e/0x1b0 [ 2673.129758][T26200] prepare_exit_to_usermode+0x402/0x4f0 [ 2673.129767][T26200] syscall_return_slowpath+0x110/0x440 [ 2673.129784][T26200] do_syscall_64+0x126/0x140 [ 2673.141259][T26199] kobject: '0:38' (00000000e73b0fbe): fill_kobj_path: path = '/devices/virtual/bdi/0:38' [ 2673.143118][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.143123][T26200] } [ 2673.143139][T26200] ... key at: [] init_once_userfaultfd_ctx.__key+0x0/0x10 [ 2673.143142][T26200] ... acquired at: [ 2673.143161][T26200] _raw_spin_lock+0x2d/0x40 [ 2673.226220][T26200] userfaultfd_ctx_read+0x3e7/0x1430 [ 2673.231673][T26200] userfaultfd_read+0x15d/0x2b0 [ 2673.236688][T26200] __vfs_read+0xf9/0x7c0 [ 2673.241120][T26200] vfs_read+0x195/0x3c0 [ 2673.245439][T26200] ksys_read+0x16b/0x2a0 [ 2673.249841][T26200] __x64_sys_read+0x7b/0x90 [ 2673.254509][T26200] do_syscall_64+0xfe/0x140 [ 2673.259177][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.265224][T26200] [ 2673.267563][T26200] -> (&ctx->fd_wqh){....} { [ 2673.272056][T26200] INITIAL USE at: [ 2673.275954][T26200] _raw_spin_lock_irqsave+0xa1/0xc0 [ 2673.282703][T26200] __wake_up_common_lock+0x105/0x240 [ 2673.289536][T26200] __wake_up+0xe/0x10 [ 2673.295079][T26200] userfaultfd_release+0x53a/0x620 [ 2673.301739][T26200] __fput+0x2e4/0x740 [ 2673.307271][T26200] ____fput+0x15/0x20 [ 2673.312815][T26200] task_work_run+0x17e/0x1b0 [ 2673.318980][T26200] prepare_exit_to_usermode+0x402/0x4f0 [ 2673.326088][T26200] syscall_return_slowpath+0x110/0x440 [ 2673.333106][T26200] do_syscall_64+0x126/0x140 [ 2673.339254][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.346696][T26200] } [ 2673.349197][T26200] ... key at: [] init_once_userfaultfd_ctx.__key.15+0x0/0x10 [ 2673.358629][T26200] ... acquired at: [ 2673.362431][T26200] _raw_spin_lock+0x2d/0x40 [ 2673.367103][T26200] io_submit_one+0x1167/0x1ac0 [ 2673.372029][T26200] __se_sys_io_submit+0x18f/0x2d0 [ 2673.377220][T26200] __x64_sys_io_submit+0x7b/0x90 [ 2673.382321][T26200] do_syscall_64+0xfe/0x140 [ 2673.387025][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.393078][T26200] [ 2673.395392][T26200] [ 2673.395392][T26200] stack backtrace: [ 2673.401278][T26200] CPU: 1 PID: 26200 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2673.409154][T26200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2673.419260][T26200] Call Trace: [ 2673.422556][T26200] dump_stack+0x1d8/0x2f8 [ 2673.426885][T26200] validate_chain+0x829b/0x84f0 [ 2673.431729][T26200] ? match_held_lock+0x280/0x280 [ 2673.436675][T26200] ? match_held_lock+0x280/0x280 [ 2673.441611][T26200] ? __bfs+0x550/0x550 [ 2673.445687][T26200] ? trace_hardirqs_off+0x74/0x80 [ 2673.450707][T26200] ? rmqueue_pcplist+0x2eb4/0x3140 [ 2673.455812][T26200] ? __bfs+0x550/0x550 [ 2673.459877][T26200] ? __lock_acquire+0xcf7/0x1a40 [ 2673.464819][T26200] ? trace_lock_acquire+0x190/0x190 [ 2673.470028][T26200] ? unwind_next_frame+0x415/0x870 [ 2673.475143][T26200] ? __bfs+0x550/0x550 [ 2673.479208][T26200] ? __bfs+0x550/0x550 [ 2673.483272][T26200] ? __bfs+0x550/0x550 [ 2673.487342][T26200] ? register_lock_class+0xde/0x1110 [ 2673.492630][T26200] ? arch_stack_walk+0x98/0xe0 [ 2673.497422][T26200] ? __bfs+0x550/0x550 [ 2673.501606][T26200] ? register_lock_class+0xde/0x1110 [ 2673.509596][T26200] ? __lock_acquire+0xcf7/0x1a40 [ 2673.514540][T26200] ? is_dynamic_key+0x1c0/0x1c0 [ 2673.519391][T26200] __lock_acquire+0xcf7/0x1a40 [ 2673.524157][T26200] ? trace_lock_acquire+0x190/0x190 [ 2673.529358][T26200] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 2673.535167][T26200] ? kasan_check_write+0x14/0x20 [ 2673.540111][T26200] ? trace_lock_acquire+0x11c/0x190 [ 2673.540511][ T3881] kobject: 'loop3' (00000000d2097bdf): kobject_uevent_env 03:15:38 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3f) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in=@broadcast}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}}, {{@in6=@empty, 0x4d7}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 2673.545334][T26200] lock_acquire+0x158/0x250 [ 2673.545347][T26200] ? io_submit_one+0x1167/0x1ac0 [ 2673.545362][T26200] _raw_spin_lock+0x2d/0x40 [ 2673.545376][T26200] ? io_submit_one+0x1167/0x1ac0 [ 2673.556517][ T3881] kobject: 'loop3' (00000000d2097bdf): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2673.556963][T26200] io_submit_one+0x1167/0x1ac0 [ 2673.586195][T26200] ? lookup_ioctx+0x6e0/0x6e0 [ 2673.590873][T26200] ? aio_poll_complete_work+0x500/0x500 [ 2673.596428][T26200] ? __might_fault+0x124/0x160 [ 2673.601194][T26200] __se_sys_io_submit+0x18f/0x2d0 [ 2673.606221][T26200] ? check_preemption_disabled+0xb7/0x280 [ 2673.611944][T26200] ? __x64_sys_io_submit+0x90/0x90 [ 2673.617059][T26200] ? debug_smp_processor_id+0x1c/0x20 [ 2673.622444][T26200] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 2673.628519][T26200] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 2673.634242][T26200] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 2673.639871][T26200] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2673.645333][T26200] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 2673.651057][T26200] ? do_syscall_64+0x1d/0x140 03:15:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3f) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in=@broadcast}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}}, {{@in6=@empty, 0x4d7}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 2673.655738][T26200] __x64_sys_io_submit+0x7b/0x90 [ 2673.660673][T26200] do_syscall_64+0xfe/0x140 [ 2673.665184][T26200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.671534][T26200] RIP: 0033:0x459519 [ 2673.675423][T26200] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2673.695023][T26200] RSP: 002b:00007fd53e10ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 2673.703439][T26200] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459519 [ 2673.711500][T26200] RDX: 0000000020000000 RSI: 0000000000000001 RDI: 00007fd53e0e9000 [ 2673.719479][T26200] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2673.727458][T26200] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd53e10b6d4 [ 2673.735437][T26200] R13: 00000000004c0898 R14: 00000000004d3548 R15: 00000000ffffffff [ 2673.757898][T26199] kobject: '0:38' (00000000e73b0fbe): kobject_uevent_env [ 2673.779107][ T3881] kobject: 'loop1' (000000006e6b1daa): kobject_uevent_env [ 2673.786343][ T3881] kobject: 'loop1' (000000006e6b1daa): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:15:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r0) userfaultfd(0x0) io_setup(0x41, &(0x7f00000006c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000000540)={0x3000000, 0x0, 0x0, 0x800000000005, 0x0, r0, 0x0}]) [ 2673.817506][T26199] kobject: '0:38' (00000000e73b0fbe): fill_kobj_path: path = '/devices/virtual/bdi/0:38' [ 2673.846983][T26199] kobject: '0:38' (00000000e73b0fbe): kobject_cleanup, parent 0000000031f5593a [ 2673.863169][ T3881] kobject: 'loop5' (000000000a2700b6): kobject_uevent_env [ 2673.877876][T26199] kobject: '0:38' (00000000e73b0fbe): calling ktype release [ 2673.879869][ T3881] kobject: 'loop5' (000000000a2700b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2673.885450][T26199] kobject: '0:38': free name 03:15:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3f) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in=@broadcast}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}}, {{@in6=@empty, 0x4d7}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 2673.980151][ T3881] kobject: 'loop3' (00000000d2097bdf): kobject_uevent_env [ 2673.987339][ T3881] kobject: 'loop3' (00000000d2097bdf): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2674.015967][ T3881] kobject: 'loop2' (00000000db6e82b2): kobject_uevent_env [ 2674.034551][ T3881] kobject: 'loop2' (00000000db6e82b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2674.094628][ T3881] kobject: 'loop5' (000000000a2700b6): kobject_uevent_env [ 2674.102148][ T3881] kobject: 'loop5' (000000000a2700b6): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2674.152475][ T3881] kobject: 'loop1' (000000006e6b1daa): kobject_uevent_env [ 2674.160277][ T3881] kobject: 'loop1' (000000006e6b1daa): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2674.171955][T26185] kobject: 'batman_adv' (000000005f7317af): kobject_uevent_env [ 2674.186700][T26185] kobject: 'batman_adv' (000000005f7317af): kobject_uevent_env: filter function caused the event to drop! [ 2674.219786][T26185] kobject: 'batman_adv' (000000005f7317af): kobject_cleanup, parent 0000000031f5593a [ 2674.235374][T26185] kobject: 'batman_adv' (000000005f7317af): calling ktype release [ 2674.246891][ T3881] kobject: 'loop3' (00000000d2097bdf): kobject_uevent_env [ 2674.247981][T26185] kobject: (000000005f7317af): dynamic_kobj_release [ 2674.260969][ T3881] kobject: 'loop3' (00000000d2097bdf): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2674.262518][T26185] kobject: 'batman_adv': free name [ 2674.276836][T26185] kobject: 'rx-0' (00000000e5f23dd4): kobject_cleanup, parent 00000000f3e05ab5 [ 2674.287507][T26185] kobject: 'rx-0' (00000000e5f23dd4): auto cleanup 'remove' event [ 2674.295324][T26185] kobject: 'rx-0' (00000000e5f23dd4): kobject_uevent_env [ 2674.307290][T26185] kobject: 'rx-0' (00000000e5f23dd4): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 2674.332066][T26185] kobject: 'rx-0' (00000000e5f23dd4): auto cleanup kobject_del [ 2674.340801][T26185] kobject: 'rx-0' (00000000e5f23dd4): calling ktype release [ 2674.348217][T26185] kobject: 'rx-0': free name [ 2674.352854][T26185] kobject: 'tx-0' (0000000035bd921d): kobject_cleanup, parent 00000000f3e05ab5 [ 2674.363142][T26185] kobject: 'tx-0' (0000000035bd921d): auto cleanup 'remove' event [ 2674.371228][T26185] kobject: 'tx-0' (0000000035bd921d): kobject_uevent_env [ 2674.378326][T26185] kobject: 'tx-0' (0000000035bd921d): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 2674.389523][T26185] kobject: 'tx-0' (0000000035bd921d): auto cleanup kobject_del [ 2674.397087][T26185] kobject: 'tx-0' (0000000035bd921d): calling ktype release [ 2674.404399][T26185] kobject: 'tx-0': free name [ 2674.409082][T26185] kobject: 'queues' (00000000f3e05ab5): kobject_cleanup, parent 0000000031f5593a [ 2674.418229][T26185] kobject: 'queues' (00000000f3e05ab5): calling ktype release [ 2674.425688][T26185] kobject: 'queues' (00000000f3e05ab5): kset_release [ 2674.432408][T26185] kobject: 'queues': free name [ 2674.437353][T26185] kobject: 'syz_tun' (0000000054cd26d1): kobject_uevent_env [ 2674.444733][T26185] kobject: 'syz_tun' (0000000054cd26d1): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 2674.459922][T26227] IPVS: ftp: loaded support on port[0] = 21 [ 2674.469182][T26227] kobject: 'lo' (0000000038c701b4): kobject_add_internal: parent: 'net', set: 'devices' [ 2674.479581][T26227] kobject: 'lo' (0000000038c701b4): kobject_uevent_env [ 2674.486474][T26227] kobject: 'lo' (0000000038c701b4): fill_kobj_path: path = '/devices/virtual/net/lo' [ 2674.496256][T26227] kobject: 'queues' (000000001db0237c): kobject_add_internal: parent: 'lo', set: '' [ 2674.506249][T26227] kobject: 'queues' (000000001db0237c): kobject_uevent_env [ 2674.513479][T26227] kobject: 'queues' (000000001db0237c): kobject_uevent_env: filter function caused the event to drop! [ 2674.524460][T26227] kobject: 'rx-0' (000000008821e1f9): kobject_add_internal: parent: 'queues', set: 'queues' [ 2674.534784][T26227] kobject: 'rx-0' (000000008821e1f9): kobject_uevent_env [ 2674.542724][T26227] kobject: 'rx-0' (000000008821e1f9): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 2674.553480][T26227] kobject: 'tx-0' (000000000de024b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 2674.563713][T26227] kobject: 'tx-0' (000000000de024b2): kobject_uevent_env [ 2674.570788][T26227] kobject: 'tx-0' (000000000de024b2): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 2674.582458][T26227] kobject: 'tunl0' (000000001d5c6a2f): kobject_add_internal: parent: 'net', set: 'devices' [ 2674.592789][T26227] kobject: 'tunl0' (000000001d5c6a2f): kobject_uevent_env [ 2674.599974][T26227] kobject: 'tunl0' (000000001d5c6a2f): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 2674.610180][T26227] kobject: 'queues' (000000008e2fafea): kobject_add_internal: parent: 'tunl0', set: '' [ 2674.620411][T26227] kobject: 'queues' (000000008e2fafea): kobject_uevent_env [ 2674.627722][T26227] kobject: 'queues' (000000008e2fafea): kobject_uevent_env: filter function caused the event to drop! [ 2674.638729][T26227] kobject: 'rx-0' (000000008260f70a): kobject_add_internal: parent: 'queues', set: 'queues' [ 2674.648852][T26227] kobject: 'rx-0' (000000008260f70a): kobject_uevent_env [ 2674.655889][T26227] kobject: 'rx-0' (000000008260f70a): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 2674.666988][T26227] kobject: 'tx-0' (00000000a4e00d55): kobject_add_internal: parent: 'queues', set: 'queues' [ 2674.677181][T26227] kobject: 'tx-0' (00000000a4e00d55): kobject_uevent_env [ 2674.684279][T26227] kobject: 'tx-0' (00000000a4e00d55): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 2674.695892][T26227] kobject: 'gre0' (000000000059f098): kobject_add_internal: parent: 'net', set: 'devices' [ 2674.706435][T26227] kobject: 'gre0' (000000000059f098): kobject_uevent_env [ 2674.713534][T26227] kobject: 'gre0' (000000000059f098): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 2674.723469][T26227] kobject: 'queues' (00000000630b181d): kobject_add_internal: parent: 'gre0', set: '' [ 2674.733588][T26227] kobject: 'queues' (00000000630b181d): kobject_uevent_env [ 2674.740831][T26227] kobject: 'queues' (00000000630b181d): kobject_uevent_env: filter function caused the event to drop! [ 2674.751822][T26227] kobject: 'rx-0' (000000004ca2d499): kobject_add_internal: parent: 'queues', set: 'queues' [ 2674.761989][T26227] kobject: 'rx-0' (000000004ca2d499): kobject_uevent_env [ 2674.769240][T26227] kobject: 'rx-0' (000000004ca2d499): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 2674.780259][T26227] kobject: 'tx-0' (000000005fcdbcdf): kobject_add_internal: parent: 'queues', set: 'queues' [ 2674.790514][T26227] kobject: 'tx-0' (000000005fcdbcdf): kobject_uevent_env [ 2674.797909][T26227] kobject: 'tx-0' (000000005fcdbcdf): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 2674.809442][T26185] kobject: 'syz_tun' (0000000054cd26d1): kobject_cleanup, parent 0000000031f5593a [ 2674.820522][T26185] kobject: 'syz_tun' (0000000054cd26d1): calling ktype release 03:15:40 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xe8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0x0) 03:15:40 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}]}}) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) [ 2674.823063][T26227] kobject: 'gretap0' (00000000e648cd2f): kobject_add_internal: parent: 'net', set: 'devices' [ 2674.828484][T26185] kobject: 'syz_tun': free name [ 2674.838851][T26227] kobject: 'gretap0' (00000000e648cd2f): kobject_uevent_env [ 2674.850608][T26227] kobject: 'gretap0' (00000000e648cd2f): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 2674.864394][T26227] kobject: 'queues' (000000002395196f): kobject_add_internal: parent: 'gretap0', set: '' [ 2674.876175][T26227] kobject: 'queues' (000000002395196f): kobject_uevent_env [ 2674.894288][T26227] kobject: 'queues' (000000002395196f): kobject_uevent_env: filter function caused the event to drop! [ 2674.907694][T26227] kobject: 'rx-0' (00000000a3040d82): kobject_add_internal: parent: 'queues', set: 'queues' [ 2674.920050][T26227] kobject: 'rx-0' (00000000a3040d82): kobject_uevent_env [ 2674.927116][T26227] kobject: 'rx-0' (00000000a3040d82): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 2674.941373][T26227] kobject: 'tx-0' (00000000c43114d2): kobject_add_internal: parent: 'queues', set: 'queues' [ 2674.951787][T26232] kobject: '0:28' (000000001d9301a9): kobject_add_internal: parent: 'bdi', set: 'devices' [ 2674.951844][T26227] kobject: 'tx-0' (00000000c43114d2): kobject_uevent_env [ 2674.969422][T26227] kobject: 'tx-0' (00000000c43114d2): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 2674.973858][T26232] kobject: '0:28' (000000001d9301a9): kobject_uevent_env [ 2674.981761][T26227] kobject: 'batman_adv' (000000004a68af14): kobject_add_internal: parent: 'gretap0', set: '' [ 2675.002333][T26232] kobject: '0:28' (000000001d9301a9): fill_kobj_path: path = '/devices/virtual/bdi/0:28' [ 2675.060332][T26232] kobject: '0:28' (000000001d9301a9): kobject_uevent_env [ 2675.069761][T26232] kobject: '0:28' (000000001d9301a9): fill_kobj_path: path = '/devices/virtual/bdi/0:28' [ 2675.086777][T26232] kobject: '0:28' (000000001d9301a9): kobject_cleanup, parent 0000000031f5593a [ 2675.096608][T26232] kobject: '0:28' (000000001d9301a9): calling ktype release [ 2675.104194][T26232] kobject: '0:28': free name [ 2675.105476][T24743] kobject: 'rx-0' (00000000c74ed4c2): kobject_cleanup, parent 0000000044912d76 [ 2675.119813][T24743] kobject: 'rx-0' (00000000c74ed4c2): auto cleanup 'remove' event [ 2675.127962][T24743] kobject: 'rx-0' (00000000c74ed4c2): kobject_uevent_env [ 2675.134126][ T3881] kobject: 'loop2' (00000000db6e82b2): kobject_uevent_env [ 2675.134996][T24743] kobject: 'rx-0' (00000000c74ed4c2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2675.143958][ T3881] kobject: 'loop2' (00000000db6e82b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2675.155296][T24743] kobject: 'rx-0' (00000000c74ed4c2): auto cleanup kobject_del [ 2675.173135][T24743] kobject: 'rx-0' (00000000c74ed4c2): calling ktype release [ 2675.181382][T24743] kobject: 'rx-0': free name [ 2675.186003][T24743] kobject: 'tx-0' (0000000093b13578): kobject_cleanup, parent 0000000044912d76 [ 2675.195381][T24743] kobject: 'tx-0' (0000000093b13578): auto cleanup 'remove' event [ 2675.203521][T24743] kobject: 'tx-0' (0000000093b13578): kobject_uevent_env [ 2675.211006][T24743] kobject: 'tx-0' (0000000093b13578): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2675.221883][T24743] kobject: 'tx-0' (0000000093b13578): auto cleanup kobject_del [ 2675.229505][T24743] kobject: 'tx-0' (0000000093b13578): calling ktype release [ 2675.236785][T24743] kobject: 'tx-0': free name [ 2675.241437][T24743] kobject: 'queues' (0000000044912d76): kobject_cleanup, parent 0000000031f5593a [ 2675.250578][T24743] kobject: 'queues' (0000000044912d76): calling ktype release [ 2675.258057][T24743] kobject: 'queues' (0000000044912d76): kset_release [ 2675.264728][T24743] kobject: 'queues': free name [ 2675.269782][T24743] kobject: 'ip6gre0' (0000000057ae17f6): kobject_uevent_env [ 2675.277049][T24743] kobject: 'ip6gre0' (0000000057ae17f6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2675.289245][T24743] kobject: 'batman_adv' (000000001f2cf8a1): kobject_uevent_env [ 2675.296799][T24743] kobject: 'batman_adv' (000000001f2cf8a1): kobject_uevent_env: filter function caused the event to drop! [ 2675.308165][T24743] kobject: 'batman_adv' (000000001f2cf8a1): kobject_cleanup, parent 0000000031f5593a [ 2675.317646][T24743] kobject: 'batman_adv' (000000001f2cf8a1): calling ktype release [ 2675.325429][T24743] kobject: (000000001f2cf8a1): dynamic_kobj_release [ 2675.332422][T24743] kobject: 'batman_adv': free name [ 2675.337753][T24743] kobject: 'rx-0' (00000000e9435261): kobject_cleanup, parent 0000000049dc4cbf [ 2675.346678][T24743] kobject: 'rx-0' (00000000e9435261): auto cleanup 'remove' event [ 2675.354560][T24743] kobject: 'rx-0' (00000000e9435261): kobject_uevent_env [ 2675.361602][T24743] kobject: 'rx-0' (00000000e9435261): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2675.372465][T24743] kobject: 'rx-0' (00000000e9435261): auto cleanup kobject_del [ 2675.380042][T24743] kobject: 'rx-0' (00000000e9435261): calling ktype release [ 2675.387429][T24743] kobject: 'rx-0': free name [ 2675.392041][T24743] kobject: 'tx-0' (000000005fc51125): kobject_cleanup, parent 0000000049dc4cbf [ 2675.400989][T24743] kobject: 'tx-0' (000000005fc51125): auto cleanup 'remove' event [ 2675.408826][T24743] kobject: 'tx-0' (000000005fc51125): kobject_uevent_env [ 2675.415843][T24743] kobject: 'tx-0' (000000005fc51125): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2675.426650][T24743] kobject: 'tx-0' (000000005fc51125): auto cleanup kobject_del [ 2675.434259][T24743] kobject: 'tx-0' (000000005fc51125): calling ktype release [ 2675.441562][T24743] kobject: 'tx-0': free name [ 2675.446172][T24743] kobject: 'queues' (0000000049dc4cbf): kobject_cleanup, parent 0000000031f5593a [ 2675.455314][T24743] kobject: 'queues' (0000000049dc4cbf): calling ktype release [ 2675.462940][T24743] kobject: 'queues' (0000000049dc4cbf): kset_release [ 2675.469650][T24743] kobject: 'queues': free name [ 2675.474594][T24743] kobject: 'ip6gretap0' (00000000059be2b9): kobject_uevent_env [ 2675.482409][T24743] kobject: 'ip6gretap0' (00000000059be2b9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2675.494166][T26227] kobject: 'erspan0' (000000000cb14f18): kobject_add_internal: parent: 'net', set: 'devices' [ 2675.511805][T26227] kobject: 'erspan0' (000000000cb14f18): kobject_uevent_env [ 2675.519127][T26227] kobject: 'erspan0' (000000000cb14f18): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 2675.529554][T26227] kobject: 'queues' (00000000cbe39a19): kobject_add_internal: parent: 'erspan0', set: '' [ 2675.539924][T26227] kobject: 'queues' (00000000cbe39a19): kobject_uevent_env [ 2675.547106][T26227] kobject: 'queues' (00000000cbe39a19): kobject_uevent_env: filter function caused the event to drop! [ 2675.558096][T26227] kobject: 'rx-0' (00000000063538b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 2675.568346][T26227] kobject: 'rx-0' (00000000063538b2): kobject_uevent_env [ 2675.575394][T26227] kobject: 'rx-0' (00000000063538b2): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 2675.586650][T26227] kobject: 'tx-0' (0000000055a3947b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2675.596976][T26227] kobject: 'tx-0' (0000000055a3947b): kobject_uevent_env [ 2675.604062][T26227] kobject: 'tx-0' (0000000055a3947b): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 2675.616002][T26227] kobject: 'batman_adv' (0000000069ce2d26): kobject_add_internal: parent: 'erspan0', set: '' [ 2675.627300][T26227] kobject: 'ip_vti0' (000000000213a7e7): kobject_add_internal: parent: 'net', set: 'devices' [ 2675.638087][T26227] kobject: 'ip_vti0' (000000000213a7e7): kobject_uevent_env [ 2675.645420][T26227] kobject: 'ip_vti0' (000000000213a7e7): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 2675.656150][T26227] kobject: 'queues' (00000000602208c1): kobject_add_internal: parent: 'ip_vti0', set: '' [ 2675.666544][T26227] kobject: 'queues' (00000000602208c1): kobject_uevent_env [ 2675.673774][T26227] kobject: 'queues' (00000000602208c1): kobject_uevent_env: filter function caused the event to drop! [ 2675.684755][T26227] kobject: 'rx-0' (0000000079096aef): kobject_add_internal: parent: 'queues', set: 'queues' [ 2675.694916][T26227] kobject: 'rx-0' (0000000079096aef): kobject_uevent_env [ 2675.702005][T26227] kobject: 'rx-0' (0000000079096aef): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 2675.713247][T26227] kobject: 'tx-0' (000000004ff3dea5): kobject_add_internal: parent: 'queues', set: 'queues' [ 2675.723703][T26227] kobject: 'tx-0' (000000004ff3dea5): kobject_uevent_env [ 2675.730801][T26227] kobject: 'tx-0' (000000004ff3dea5): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 2675.742611][T24743] kobject: 'ip6gre0' (0000000057ae17f6): kobject_cleanup, parent 0000000031f5593a [ 2675.743972][T26227] kobject: 'ip6_vti0' (00000000da450471): kobject_add_internal: parent: 'net', set: 'devices' [ 2675.751900][T24743] kobject: 'ip6gre0' (0000000057ae17f6): calling ktype release [ 2675.764944][T26227] kobject: 'ip6_vti0' (00000000da450471): kobject_uevent_env [ 2675.769810][T24743] kobject: 'ip6gre0': free name [ 2675.777304][T26227] kobject: 'ip6_vti0' (00000000da450471): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 2675.792749][T26227] kobject: 'queues' (00000000c4c889d3): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 2675.803260][T26227] kobject: 'queues' (00000000c4c889d3): kobject_uevent_env [ 2675.810570][T26227] kobject: 'queues' (00000000c4c889d3): kobject_uevent_env: filter function caused the event to drop! [ 2675.821586][T26227] kobject: 'rx-0' (00000000e29c3122): kobject_add_internal: parent: 'queues', set: 'queues' [ 2675.831725][T26227] kobject: 'rx-0' (00000000e29c3122): kobject_uevent_env [ 2675.838805][T26227] kobject: 'rx-0' (00000000e29c3122): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 2675.850642][T26227] kobject: 'tx-0' (00000000e508fb4e): kobject_add_internal: parent: 'queues', set: 'queues' [ 2675.860873][T26227] kobject: 'tx-0' (00000000e508fb4e): kobject_uevent_env [ 2675.867960][T26227] kobject: 'tx-0' (00000000e508fb4e): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 2675.879870][T24743] kobject: 'ip6gretap0' (00000000059be2b9): kobject_cleanup, parent 0000000031f5593a [ 2675.879993][T26227] kobject: 'sit0' (00000000cb7cbe7c): kobject_add_internal: parent: 'net', set: 'devices' [ 2675.892095][T24743] kobject: 'ip6gretap0' (00000000059be2b9): calling ktype release [ 2675.899888][T26227] kobject: 'sit0' (00000000cb7cbe7c): kobject_uevent_env [ 2675.907255][T24743] kobject: 'ip6gretap0': free name [ 2675.914185][T26227] kobject: 'sit0' (00000000cb7cbe7c): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 2675.929181][T26227] kobject: 'queues' (00000000c7b4584f): kobject_add_internal: parent: 'sit0', set: '' [ 2675.939396][T26227] kobject: 'queues' (00000000c7b4584f): kobject_uevent_env [ 2675.946599][T26227] kobject: 'queues' (00000000c7b4584f): kobject_uevent_env: filter function caused the event to drop! [ 2675.957600][T26227] kobject: 'rx-0' (000000008385914f): kobject_add_internal: parent: 'queues', set: 'queues' [ 2675.967829][T26227] kobject: 'rx-0' (000000008385914f): kobject_uevent_env [ 2675.974901][T26227] kobject: 'rx-0' (000000008385914f): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 2675.986135][T26227] kobject: 'tx-0' (00000000ed2f7cad): kobject_add_internal: parent: 'queues', set: 'queues' [ 2675.996390][T26227] kobject: 'tx-0' (00000000ed2f7cad): kobject_uevent_env [ 2676.003470][T26227] kobject: 'tx-0' (00000000ed2f7cad): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 2676.035613][T24743] kobject: 'rx-0' (00000000ba2ecb0d): kobject_cleanup, parent 0000000048fa2ab8 [ 2676.044650][T24743] kobject: 'rx-0' (00000000ba2ecb0d): auto cleanup 'remove' event [ 2676.052669][T24743] kobject: 'rx-0' (00000000ba2ecb0d): kobject_uevent_env [ 2676.059800][T24743] kobject: 'rx-0' (00000000ba2ecb0d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2676.070619][T24743] kobject: 'rx-0' (00000000ba2ecb0d): auto cleanup kobject_del [ 2676.078235][T24743] kobject: 'rx-0' (00000000ba2ecb0d): calling ktype release [ 2676.085684][T24743] kobject: 'rx-0': free name [ 2676.090350][T24743] kobject: 'tx-0' (00000000ed0f46e2): kobject_cleanup, parent 0000000048fa2ab8 [ 2676.099427][T24743] kobject: 'tx-0' (00000000ed0f46e2): auto cleanup 'remove' event [ 2676.107213][T24743] kobject: 'tx-0' (00000000ed0f46e2): kobject_uevent_env [ 2676.114537][T24743] kobject: 'tx-0' (00000000ed0f46e2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2676.125391][T24743] kobject: 'tx-0' (00000000ed0f46e2): auto cleanup kobject_del [ 2676.133377][T24743] kobject: 'tx-0' (00000000ed0f46e2): calling ktype release [ 2676.140750][T24743] kobject: 'tx-0': free name [ 2676.145360][T24743] kobject: 'queues' (0000000048fa2ab8): kobject_cleanup, parent 0000000031f5593a [ 2676.154513][T24743] kobject: 'queues' (0000000048fa2ab8): calling ktype release [ 2676.161993][T24743] kobject: 'queues' (0000000048fa2ab8): kset_release [ 2676.169355][T24743] kobject: 'queues': free name [ 2676.181900][T24743] kobject: 'ip6tnl0' (00000000de7fa8bb): kobject_uevent_env [ 2676.189234][T24743] kobject: 'ip6tnl0' (00000000de7fa8bb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2676.200637][T26227] kobject: 'ip6tnl0' (00000000862a203a): kobject_add_internal: parent: 'net', set: 'devices' [ 2676.211268][T26227] kobject: 'ip6tnl0' (00000000862a203a): kobject_uevent_env [ 2676.218761][T26227] kobject: 'ip6tnl0' (00000000862a203a): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 2676.229189][T26227] kobject: 'queues' (000000006e8c7d18): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 2676.239893][T26227] kobject: 'queues' (000000006e8c7d18): kobject_uevent_env [ 2676.247091][T26227] kobject: 'queues' (000000006e8c7d18): kobject_uevent_env: filter function caused the event to drop! [ 2676.258144][T26227] kobject: 'rx-0' (00000000f230b8eb): kobject_add_internal: parent: 'queues', set: 'queues' [ 2676.268388][T26227] kobject: 'rx-0' (00000000f230b8eb): kobject_uevent_env [ 2676.275673][T26227] kobject: 'rx-0' (00000000f230b8eb): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 2676.286930][T26227] kobject: 'tx-0' (00000000ee7a26df): kobject_add_internal: parent: 'queues', set: 'queues' [ 2676.297227][T26227] kobject: 'tx-0' (00000000ee7a26df): kobject_uevent_env [ 2676.304325][T26227] kobject: 'tx-0' (00000000ee7a26df): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 2676.316356][T24743] kobject: 'ip6tnl0' (00000000de7fa8bb): kobject_cleanup, parent 0000000031f5593a [ 2676.316489][T26227] kobject: 'ip6gre0' (00000000fe2a2a5d): kobject_add_internal: parent: 'net', set: 'devices' [ 2676.327803][T24743] kobject: 'ip6tnl0' (00000000de7fa8bb): calling ktype release [ 2676.336381][T26227] kobject: 'ip6gre0' (00000000fe2a2a5d): kobject_uevent_env [ 2676.345729][T24743] kobject: 'ip6tnl0': free name [ 2676.350749][T26227] kobject: 'ip6gre0' (00000000fe2a2a5d): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 2676.365981][T26227] kobject: 'queues' (00000000eb4265c0): kobject_add_internal: parent: 'ip6gre0', set: '' [ 2676.376623][T26227] kobject: 'queues' (00000000eb4265c0): kobject_uevent_env [ 2676.383876][T26227] kobject: 'queues' (00000000eb4265c0): kobject_uevent_env: filter function caused the event to drop! [ 2676.394897][T26227] kobject: 'rx-0' (0000000022f8737d): kobject_add_internal: parent: 'queues', set: 'queues' [ 2676.405047][T26227] kobject: 'rx-0' (0000000022f8737d): kobject_uevent_env [ 2676.412149][T26227] kobject: 'rx-0' (0000000022f8737d): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 2676.423377][T26227] kobject: 'tx-0' (000000005904b7f4): kobject_add_internal: parent: 'queues', set: 'queues' [ 2676.434136][T26227] kobject: 'tx-0' (000000005904b7f4): kobject_uevent_env [ 2676.441221][T26227] kobject: 'tx-0' (000000005904b7f4): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 2676.476806][T24743] kobject: 'rx-0' (000000005218f5d5): kobject_cleanup, parent 00000000ebb2e0c3 [ 2676.485950][T24743] kobject: 'rx-0' (000000005218f5d5): auto cleanup 'remove' event [ 2676.493788][T24743] kobject: 'rx-0' (000000005218f5d5): kobject_uevent_env [ 2676.500941][T24743] kobject: 'rx-0' (000000005218f5d5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2676.511752][T24743] kobject: 'rx-0' (000000005218f5d5): auto cleanup kobject_del [ 2676.519372][T24743] kobject: 'rx-0' (000000005218f5d5): calling ktype release [ 2676.526635][T24743] kobject: 'rx-0': free name [ 2676.531782][T24743] kobject: 'tx-0' (0000000056ffebb6): kobject_cleanup, parent 00000000ebb2e0c3 [ 2676.541529][T24743] kobject: 'tx-0' (0000000056ffebb6): auto cleanup 'remove' event [ 2676.549493][T24743] kobject: 'tx-0' (0000000056ffebb6): kobject_uevent_env [ 2676.556492][T24743] kobject: 'tx-0' (0000000056ffebb6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2676.567282][T24743] kobject: 'tx-0' (0000000056ffebb6): auto cleanup kobject_del [ 2676.574861][T24743] kobject: 'tx-0' (0000000056ffebb6): calling ktype release [ 2676.582173][T24743] kobject: 'tx-0': free name [ 2676.586900][T24743] kobject: 'queues' (00000000ebb2e0c3): kobject_cleanup, parent 0000000031f5593a [ 2676.596037][T24743] kobject: 'queues' (00000000ebb2e0c3): calling ktype release [ 2676.603536][T24743] kobject: 'queues' (00000000ebb2e0c3): kset_release [ 2676.610338][T24743] kobject: 'queues': free name [ 2676.615274][T24743] kobject: 'sit0' (00000000b33d0957): kobject_uevent_env [ 2676.622344][T24743] kobject: 'sit0' (00000000b33d0957): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2676.641180][T26227] kobject: 'syz_tun' (000000007312f9f0): kobject_add_internal: parent: 'net', set: 'devices' [ 2676.651888][T26227] kobject: 'syz_tun' (000000007312f9f0): kobject_uevent_env [ 2676.659243][T26227] kobject: 'syz_tun' (000000007312f9f0): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 2676.669706][T26227] kobject: 'queues' (00000000242e6398): kobject_add_internal: parent: 'syz_tun', set: '' [ 2676.681113][T26227] kobject: 'queues' (00000000242e6398): kobject_uevent_env [ 2676.688378][T26227] kobject: 'queues' (00000000242e6398): kobject_uevent_env: filter function caused the event to drop! [ 2676.699356][T26227] kobject: 'rx-0' (00000000e5d5623b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2676.709468][T26227] kobject: 'rx-0' (00000000e5d5623b): kobject_uevent_env [ 2676.716480][T26227] kobject: 'rx-0' (00000000e5d5623b): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 2676.727683][T26227] kobject: 'tx-0' (00000000222678ec): kobject_add_internal: parent: 'queues', set: 'queues' [ 2676.737893][T26227] kobject: 'tx-0' (00000000222678ec): kobject_uevent_env [ 2676.744916][T26227] kobject: 'tx-0' (00000000222678ec): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 2676.756614][T26227] kobject: 'batman_adv' (00000000e829dafc): kobject_add_internal: parent: 'syz_tun', set: '' [ 2676.769153][T24743] kobject: 'sit0' (00000000b33d0957): kobject_cleanup, parent 0000000031f5593a [ 2676.772674][T26227] kobject: 'ip6gretap0' (0000000048defdf0): kobject_add_internal: parent: 'net', set: 'devices' [ 2676.778746][T24743] kobject: 'sit0' (00000000b33d0957): calling ktype release [ 2676.789158][T26227] kobject: 'ip6gretap0' (0000000048defdf0): kobject_uevent_env [ 2676.797521][T24743] kobject: 'sit0': free name [ 2676.803680][T26227] kobject: 'ip6gretap0' (0000000048defdf0): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 2676.818919][T26227] kobject: 'queues' (00000000b8d0f5b9): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 2676.829562][T26227] kobject: 'queues' (00000000b8d0f5b9): kobject_uevent_env [ 2676.836786][T26227] kobject: 'queues' (00000000b8d0f5b9): kobject_uevent_env: filter function caused the event to drop! [ 2676.847838][T26227] kobject: 'rx-0' (00000000e48f3dcc): kobject_add_internal: parent: 'queues', set: 'queues' [ 2676.858120][T26227] kobject: 'rx-0' (00000000e48f3dcc): kobject_uevent_env [ 2676.865175][T26227] kobject: 'rx-0' (00000000e48f3dcc): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 2676.876667][T26227] kobject: 'tx-0' (00000000c64e6a6c): kobject_add_internal: parent: 'queues', set: 'queues' [ 2676.886830][T26227] kobject: 'tx-0' (00000000c64e6a6c): kobject_uevent_env [ 2676.893905][T26227] kobject: 'tx-0' (00000000c64e6a6c): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 2676.906028][T26227] kobject: 'batman_adv' (000000002e30cc9e): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 2676.938796][T24743] kobject: 'rx-0' (000000002c2112b7): kobject_cleanup, parent 0000000066e2a003 [ 2676.947817][T24743] kobject: 'rx-0' (000000002c2112b7): auto cleanup 'remove' event [ 2676.955605][T24743] kobject: 'rx-0' (000000002c2112b7): kobject_uevent_env [ 2676.962721][T24743] kobject: 'rx-0' (000000002c2112b7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2676.973510][T24743] kobject: 'rx-0' (000000002c2112b7): auto cleanup kobject_del [ 2676.981102][T24743] kobject: 'rx-0' (000000002c2112b7): calling ktype release [ 2676.988407][T24743] kobject: 'rx-0': free name [ 2676.993018][T24743] kobject: 'tx-0' (00000000ba84a600): kobject_cleanup, parent 0000000066e2a003 [ 2677.001973][T24743] kobject: 'tx-0' (00000000ba84a600): auto cleanup 'remove' event [ 2677.009810][T24743] kobject: 'tx-0' (00000000ba84a600): kobject_uevent_env [ 2677.016813][T24743] kobject: 'tx-0' (00000000ba84a600): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2677.027876][T24743] kobject: 'tx-0' (00000000ba84a600): auto cleanup kobject_del [ 2677.035451][T24743] kobject: 'tx-0' (00000000ba84a600): calling ktype release [ 2677.042788][T24743] kobject: 'tx-0': free name [ 2677.047770][T24743] kobject: 'queues' (0000000066e2a003): kobject_cleanup, parent 0000000031f5593a [ 2677.056872][T24743] kobject: 'queues' (0000000066e2a003): calling ktype release [ 2677.064357][T24743] kobject: 'queues' (0000000066e2a003): kset_release [ 2677.071056][T24743] kobject: 'queues': free name [ 2677.076004][T24743] kobject: 'ip6_vti0' (0000000059c10c65): kobject_uevent_env [ 2677.083417][T24743] kobject: 'ip6_vti0' (0000000059c10c65): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2677.095080][T26227] kobject: 'bridge0' (00000000b9e238cb): kobject_add_internal: parent: 'net', set: 'devices' [ 2677.107559][T26227] kobject: 'bridge0' (00000000b9e238cb): kobject_uevent_env [ 2677.114856][T26227] kobject: 'bridge0' (00000000b9e238cb): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 2677.126650][T26227] kobject: 'queues' (000000008472775e): kobject_add_internal: parent: 'bridge0', set: '' [ 2677.137754][T26227] kobject: 'queues' (000000008472775e): kobject_uevent_env [ 2677.145043][T26227] kobject: 'queues' (000000008472775e): kobject_uevent_env: filter function caused the event to drop! [ 2677.156093][T26227] kobject: 'rx-0' (00000000dc735ae7): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.166221][T26227] kobject: 'rx-0' (00000000dc735ae7): kobject_uevent_env [ 2677.173291][T26227] kobject: 'rx-0' (00000000dc735ae7): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 2677.184471][T26227] kobject: 'tx-0' (00000000e9799f5b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.194669][T26227] kobject: 'tx-0' (00000000e9799f5b): kobject_uevent_env [ 2677.201726][T26227] kobject: 'tx-0' (00000000e9799f5b): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 2677.213636][T26227] kobject: 'brif' (00000000dbb281c1): kobject_add_internal: parent: 'bridge0', set: '' [ 2677.223944][T26227] kobject: 'batman_adv' (00000000b0a8c0ca): kobject_add_internal: parent: 'bridge0', set: '' [ 2677.234988][T24743] kobject: 'ip6_vti0' (0000000059c10c65): kobject_cleanup, parent 0000000031f5593a [ 2677.235277][T26227] kobject: 'vcan0' (00000000acb56cc6): kobject_add_internal: parent: 'net', set: 'devices' [ 2677.245400][T24743] kobject: 'ip6_vti0' (0000000059c10c65): calling ktype release [ 2677.254964][T26227] kobject: 'vcan0' (00000000acb56cc6): kobject_uevent_env [ 2677.264104][T24743] kobject: 'ip6_vti0': free name [ 2677.269152][T26227] kobject: 'vcan0' (00000000acb56cc6): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 2677.284084][T26227] kobject: 'queues' (000000006646cc65): kobject_add_internal: parent: 'vcan0', set: '' [ 2677.294303][T26227] kobject: 'queues' (000000006646cc65): kobject_uevent_env [ 2677.301546][T26227] kobject: 'queues' (000000006646cc65): kobject_uevent_env: filter function caused the event to drop! [ 2677.312566][T26227] kobject: 'rx-0' (0000000080d07e3f): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.322709][T26227] kobject: 'rx-0' (0000000080d07e3f): kobject_uevent_env [ 2677.329787][T26227] kobject: 'rx-0' (0000000080d07e3f): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 2677.340795][T26227] kobject: 'tx-0' (000000005d1f712d): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.351024][T26227] kobject: 'tx-0' (000000005d1f712d): kobject_uevent_env [ 2677.358117][T26227] kobject: 'tx-0' (000000005d1f712d): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 2677.389914][T24743] kobject: 'rx-0' (00000000cf6b55df): kobject_cleanup, parent 00000000204dd657 [ 2677.398896][T24743] kobject: 'rx-0' (00000000cf6b55df): auto cleanup 'remove' event [ 2677.406691][T24743] kobject: 'rx-0' (00000000cf6b55df): kobject_uevent_env [ 2677.413814][T24743] kobject: 'rx-0' (00000000cf6b55df): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2677.424627][T24743] kobject: 'rx-0' (00000000cf6b55df): auto cleanup kobject_del [ 2677.432240][T24743] kobject: 'rx-0' (00000000cf6b55df): calling ktype release [ 2677.439532][T24743] kobject: 'rx-0': free name [ 2677.444135][T24743] kobject: 'tx-0' (00000000dcdd99f1): kobject_cleanup, parent 00000000204dd657 [ 2677.453098][T24743] kobject: 'tx-0' (00000000dcdd99f1): auto cleanup 'remove' event [ 2677.460914][T24743] kobject: 'tx-0' (00000000dcdd99f1): kobject_uevent_env [ 2677.467958][T24743] kobject: 'tx-0' (00000000dcdd99f1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2677.478739][T24743] kobject: 'tx-0' (00000000dcdd99f1): auto cleanup kobject_del [ 2677.486305][T24743] kobject: 'tx-0' (00000000dcdd99f1): calling ktype release [ 2677.493810][T24743] kobject: 'tx-0': free name [ 2677.498482][T24743] kobject: 'queues' (00000000204dd657): kobject_cleanup, parent 0000000031f5593a [ 2677.515299][T24743] kobject: 'queues' (00000000204dd657): calling ktype release [ 2677.522786][T24743] kobject: 'queues' (00000000204dd657): kset_release [ 2677.529480][T24743] kobject: 'queues': free name [ 2677.534406][T24743] kobject: 'ip_vti0' (000000005bd67e7d): kobject_uevent_env [ 2677.541733][T24743] kobject: 'ip_vti0' (000000005bd67e7d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2677.553415][T26227] kobject: 'bond0' (00000000571b7ad9): kobject_add_internal: parent: 'net', set: 'devices' [ 2677.564014][T26227] kobject: 'bond0' (00000000571b7ad9): kobject_uevent_env [ 2677.571199][T26227] kobject: 'bond0' (00000000571b7ad9): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 2677.581291][T26227] kobject: 'queues' (00000000c8c62790): kobject_add_internal: parent: 'bond0', set: '' [ 2677.591514][T26227] kobject: 'queues' (00000000c8c62790): kobject_uevent_env [ 2677.598741][T26227] kobject: 'queues' (00000000c8c62790): kobject_uevent_env: filter function caused the event to drop! [ 2677.609734][T26227] kobject: 'rx-0' (000000007b35c0a6): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.619869][T26227] kobject: 'rx-0' (000000007b35c0a6): kobject_uevent_env [ 2677.626903][T26227] kobject: 'rx-0' (000000007b35c0a6): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 2677.637961][T26227] kobject: 'rx-1' (00000000d588ce90): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.648320][T26227] kobject: 'rx-1' (00000000d588ce90): kobject_uevent_env [ 2677.655354][T26227] kobject: 'rx-1' (00000000d588ce90): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 2677.666425][T26227] kobject: 'rx-2' (00000000381bfa47): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.676606][T26227] kobject: 'rx-2' (00000000381bfa47): kobject_uevent_env [ 2677.683722][T26227] kobject: 'rx-2' (00000000381bfa47): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 2677.694732][T26227] kobject: 'rx-3' (00000000ffba9f81): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.704865][T26227] kobject: 'rx-3' (00000000ffba9f81): kobject_uevent_env [ 2677.711928][T26227] kobject: 'rx-3' (00000000ffba9f81): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 2677.722956][T26227] kobject: 'rx-4' (00000000c949ddba): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.733247][T26227] kobject: 'rx-4' (00000000c949ddba): kobject_uevent_env [ 2677.740349][T26227] kobject: 'rx-4' (00000000c949ddba): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 2677.751360][T26227] kobject: 'rx-5' (00000000f2f1f70c): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.761500][T26227] kobject: 'rx-5' (00000000f2f1f70c): kobject_uevent_env [ 2677.768590][T26227] kobject: 'rx-5' (00000000f2f1f70c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 2677.779677][T26227] kobject: 'rx-6' (0000000013c5e3c5): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.789820][T26227] kobject: 'rx-6' (0000000013c5e3c5): kobject_uevent_env [ 2677.796858][T26227] kobject: 'rx-6' (0000000013c5e3c5): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-6' [ 2677.807936][T26227] kobject: 'rx-7' (000000007b03e11e): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.818140][T26227] kobject: 'rx-7' (000000007b03e11e): kobject_uevent_env [ 2677.825184][T26227] kobject: 'rx-7' (000000007b03e11e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-7' [ 2677.836240][T26227] kobject: 'rx-8' (00000000a93c31f9): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.846370][T26227] kobject: 'rx-8' (00000000a93c31f9): kobject_uevent_env [ 2677.853458][T26227] kobject: 'rx-8' (00000000a93c31f9): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-8' [ 2677.864473][T26227] kobject: 'rx-9' (0000000095e3f80c): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.874629][T26227] kobject: 'rx-9' (0000000095e3f80c): kobject_uevent_env [ 2677.881696][T26227] kobject: 'rx-9' (0000000095e3f80c): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-9' [ 2677.893109][T26227] kobject: 'rx-10' (00000000cb4172ee): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.903370][T26227] kobject: 'rx-10' (00000000cb4172ee): kobject_uevent_env [ 2677.910555][T26227] kobject: 'rx-10' (00000000cb4172ee): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-10' [ 2677.921780][T26227] kobject: 'rx-11' (000000002bb78054): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.932003][T26227] kobject: 'rx-11' (000000002bb78054): kobject_uevent_env [ 2677.939172][T26227] kobject: 'rx-11' (000000002bb78054): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-11' [ 2677.950355][T26227] kobject: 'rx-12' (000000005d7cba24): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.960570][T26227] kobject: 'rx-12' (000000005d7cba24): kobject_uevent_env [ 2677.967785][T26227] kobject: 'rx-12' (000000005d7cba24): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-12' [ 2677.979021][T26227] kobject: 'rx-13' (00000000f51f8514): kobject_add_internal: parent: 'queues', set: 'queues' [ 2677.989269][T26227] kobject: 'rx-13' (00000000f51f8514): kobject_uevent_env [ 2677.996389][T26227] kobject: 'rx-13' (00000000f51f8514): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-13' [ 2678.007621][T26227] kobject: 'rx-14' (000000003a47e5a0): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.017879][T26227] kobject: 'rx-14' (000000003a47e5a0): kobject_uevent_env [ 2678.025053][T26227] kobject: 'rx-14' (000000003a47e5a0): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-14' [ 2678.036436][T26227] kobject: 'rx-15' (000000002dc9d0bb): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.046663][T26227] kobject: 'rx-15' (000000002dc9d0bb): kobject_uevent_env [ 2678.053851][T26227] kobject: 'rx-15' (000000002dc9d0bb): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-15' [ 2678.065097][T26227] kobject: 'tx-0' (00000000a4c08f83): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.075492][T26227] kobject: 'tx-0' (00000000a4c08f83): kobject_uevent_env [ 2678.082622][T26227] kobject: 'tx-0' (00000000a4c08f83): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-0' [ 2678.095216][T26227] kobject: 'tx-1' (00000000701ec809): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.105438][T26227] kobject: 'tx-1' (00000000701ec809): kobject_uevent_env [ 2678.112544][T26227] kobject: 'tx-1' (00000000701ec809): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-1' [ 2678.123613][T26227] kobject: 'tx-2' (0000000085ea85e2): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.134026][T26227] kobject: 'tx-2' (0000000085ea85e2): kobject_uevent_env [ 2678.141163][T26227] kobject: 'tx-2' (0000000085ea85e2): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-2' [ 2678.152185][T26227] kobject: 'tx-3' (0000000068fba1db): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.162415][T26227] kobject: 'tx-3' (0000000068fba1db): kobject_uevent_env [ 2678.169591][T26227] kobject: 'tx-3' (0000000068fba1db): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-3' [ 2678.180633][T26227] kobject: 'tx-4' (00000000851b3925): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.190840][T26227] kobject: 'tx-4' (00000000851b3925): kobject_uevent_env [ 2678.197919][T26227] kobject: 'tx-4' (00000000851b3925): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-4' [ 2678.209000][T26227] kobject: 'tx-5' (00000000925f31ef): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.219256][T26227] kobject: 'tx-5' (00000000925f31ef): kobject_uevent_env [ 2678.226301][T26227] kobject: 'tx-5' (00000000925f31ef): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-5' [ 2678.237369][T26227] kobject: 'tx-6' (00000000a979c7fb): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.247632][T26227] kobject: 'tx-6' (00000000a979c7fb): kobject_uevent_env [ 2678.254669][T26227] kobject: 'tx-6' (00000000a979c7fb): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-6' [ 2678.265714][T26227] kobject: 'tx-7' (00000000aac9eb84): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.275934][T26227] kobject: 'tx-7' (00000000aac9eb84): kobject_uevent_env [ 2678.283022][T26227] kobject: 'tx-7' (00000000aac9eb84): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-7' [ 2678.294054][T26227] kobject: 'tx-8' (0000000035d483c0): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.304287][T26227] kobject: 'tx-8' (0000000035d483c0): kobject_uevent_env [ 2678.311389][T26227] kobject: 'tx-8' (0000000035d483c0): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-8' [ 2678.322447][T26227] kobject: 'tx-9' (0000000026462bd2): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.332631][T26227] kobject: 'tx-9' (0000000026462bd2): kobject_uevent_env [ 2678.339705][T26227] kobject: 'tx-9' (0000000026462bd2): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-9' [ 2678.350740][T26227] kobject: 'tx-10' (000000009227714a): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.361051][T26227] kobject: 'tx-10' (000000009227714a): kobject_uevent_env [ 2678.368269][T26227] kobject: 'tx-10' (000000009227714a): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-10' [ 2678.379482][T26227] kobject: 'tx-11' (00000000b98fa718): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.389742][T26227] kobject: 'tx-11' (00000000b98fa718): kobject_uevent_env [ 2678.396863][T26227] kobject: 'tx-11' (00000000b98fa718): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-11' [ 2678.408111][T26227] kobject: 'tx-12' (0000000091e80b10): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.418445][T26227] kobject: 'tx-12' (0000000091e80b10): kobject_uevent_env [ 2678.425579][T26227] kobject: 'tx-12' (0000000091e80b10): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-12' [ 2678.436834][T26227] kobject: 'tx-13' (00000000ee495f1b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.447111][T26227] kobject: 'tx-13' (00000000ee495f1b): kobject_uevent_env [ 2678.454294][T26227] kobject: 'tx-13' (00000000ee495f1b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-13' [ 2678.465485][T26227] kobject: 'tx-14' (00000000b3b9e78b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.475787][T26227] kobject: 'tx-14' (00000000b3b9e78b): kobject_uevent_env [ 2678.482931][T26227] kobject: 'tx-14' (00000000b3b9e78b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-14' [ 2678.494169][T26227] kobject: 'tx-15' (000000004750cf2b): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.504482][T26227] kobject: 'tx-15' (000000004750cf2b): kobject_uevent_env [ 2678.511679][T26227] kobject: 'tx-15' (000000004750cf2b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-15' [ 2678.523453][T26227] kobject: 'batman_adv' (000000008eb78e02): kobject_add_internal: parent: 'bond0', set: '' [ 2678.535453][T24743] kobject: 'ip_vti0' (000000005bd67e7d): kobject_cleanup, parent 0000000031f5593a [ 2678.536069][T26227] kobject: 'team0' (00000000b26e284f): kobject_add_internal: parent: 'net', set: 'devices' [ 2678.547733][T24743] kobject: 'ip_vti0' (000000005bd67e7d): calling ktype release [ 2678.555343][T26227] kobject: 'team0' (00000000b26e284f): kobject_uevent_env [ 2678.565991][T24743] kobject: 'ip_vti0': free name [ 2678.571026][T26227] kobject: 'team0' (00000000b26e284f): fill_kobj_path: path = '/devices/virtual/net/team0' [ 2678.585884][T26227] kobject: 'queues' (00000000ba4277bd): kobject_add_internal: parent: 'team0', set: '' [ 2678.596212][T26227] kobject: 'queues' (00000000ba4277bd): kobject_uevent_env [ 2678.603709][T26227] kobject: 'queues' (00000000ba4277bd): kobject_uevent_env: filter function caused the event to drop! [ 2678.614801][T26227] kobject: 'rx-0' (000000001cdc6495): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.632512][T26227] kobject: 'rx-0' (000000001cdc6495): kobject_uevent_env [ 2678.639717][T26227] kobject: 'rx-0' (000000001cdc6495): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-0' [ 2678.651161][T26227] kobject: 'rx-1' (00000000383a7a5d): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.661560][T26227] kobject: 'rx-1' (00000000383a7a5d): kobject_uevent_env [ 2678.668666][T26227] kobject: 'rx-1' (00000000383a7a5d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-1' [ 2678.679926][T26227] kobject: 'rx-2' (00000000af35f08f): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.690269][T26227] kobject: 'rx-2' (00000000af35f08f): kobject_uevent_env [ 2678.697349][T26227] kobject: 'rx-2' (00000000af35f08f): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-2' [ 2678.708428][T26227] kobject: 'rx-3' (00000000b1c722a2): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.718834][T26227] kobject: 'rx-3' (00000000b1c722a2): kobject_uevent_env [ 2678.725897][T26227] kobject: 'rx-3' (00000000b1c722a2): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-3' [ 2678.737181][T26227] kobject: 'rx-4' (000000000769236a): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.747350][T26227] kobject: 'rx-4' (000000000769236a): kobject_uevent_env [ 2678.754490][T26227] kobject: 'rx-4' (000000000769236a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-4' [ 2678.765828][T26227] kobject: 'rx-5' (000000009acbc467): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.776477][T26227] kobject: 'rx-5' (000000009acbc467): kobject_uevent_env [ 2678.783915][T26227] kobject: 'rx-5' (000000009acbc467): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-5' [ 2678.796698][T26227] kobject: 'rx-6' (000000005883004f): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.806939][T26227] kobject: 'rx-6' (000000005883004f): kobject_uevent_env [ 2678.814176][T26227] kobject: 'rx-6' (000000005883004f): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-6' [ 2678.826127][T26227] kobject: 'rx-7' (000000002f01671f): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.836503][T26227] kobject: 'rx-7' (000000002f01671f): kobject_uevent_env [ 2678.843593][T26227] kobject: 'rx-7' (000000002f01671f): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-7' [ 2678.854732][T26227] kobject: 'rx-8' (00000000b2a93f2d): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.865153][T26227] kobject: 'rx-8' (00000000b2a93f2d): kobject_uevent_env [ 2678.872243][T26227] kobject: 'rx-8' (00000000b2a93f2d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-8' [ 2678.883311][T26227] kobject: 'rx-9' (00000000a8822cdd): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.893649][T26227] kobject: 'rx-9' (00000000a8822cdd): kobject_uevent_env [ 2678.900764][T26227] kobject: 'rx-9' (00000000a8822cdd): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-9' [ 2678.911862][T26227] kobject: 'rx-10' (000000001423e2de): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.922153][T26227] kobject: 'rx-10' (000000001423e2de): kobject_uevent_env [ 2678.929427][T26227] kobject: 'rx-10' (000000001423e2de): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-10' [ 2678.940668][T26227] kobject: 'rx-11' (000000005794ad5d): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.951011][T26227] kobject: 'rx-11' (000000005794ad5d): kobject_uevent_env [ 2678.958192][T26227] kobject: 'rx-11' (000000005794ad5d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-11' [ 2678.969402][T26227] kobject: 'rx-12' (000000003964b2c3): kobject_add_internal: parent: 'queues', set: 'queues' [ 2678.983368][T26227] kobject: 'rx-12' (000000003964b2c3): kobject_uevent_env [ 2678.990567][T26227] kobject: 'rx-12' (000000003964b2c3): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-12' [ 2679.002134][T26227] kobject: 'rx-13' (00000000d727f865): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.012390][T26227] kobject: 'rx-13' (00000000d727f865): kobject_uevent_env [ 2679.019569][T26227] kobject: 'rx-13' (00000000d727f865): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-13' [ 2679.030839][T26227] kobject: 'rx-14' (0000000019f5645c): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.041220][T26227] kobject: 'rx-14' (0000000019f5645c): kobject_uevent_env [ 2679.048429][T26227] kobject: 'rx-14' (0000000019f5645c): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-14' [ 2679.059787][T26227] kobject: 'rx-15' (00000000a5375f33): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.070057][T26227] kobject: 'rx-15' (00000000a5375f33): kobject_uevent_env [ 2679.077230][T26227] kobject: 'rx-15' (00000000a5375f33): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-15' [ 2679.088518][T26227] kobject: 'tx-0' (000000009938a1f7): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.098882][T26227] kobject: 'tx-0' (000000009938a1f7): kobject_uevent_env [ 2679.105945][T26227] kobject: 'tx-0' (000000009938a1f7): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-0' [ 2679.117023][T26227] kobject: 'tx-1' (00000000d759dabe): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.127212][T26227] kobject: 'tx-1' (00000000d759dabe): kobject_uevent_env [ 2679.134308][T26227] kobject: 'tx-1' (00000000d759dabe): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-1' [ 2679.145385][T26227] kobject: 'tx-2' (00000000ae96fdfb): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.155573][T26227] kobject: 'tx-2' (00000000ae96fdfb): kobject_uevent_env [ 2679.162763][T26227] kobject: 'tx-2' (00000000ae96fdfb): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-2' [ 2679.173860][T26227] kobject: 'tx-3' (00000000a0a1bee7): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.184085][T26227] kobject: 'tx-3' (00000000a0a1bee7): kobject_uevent_env [ 2679.191212][T26227] kobject: 'tx-3' (00000000a0a1bee7): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-3' [ 2679.202285][T26227] kobject: 'tx-4' (000000000733f971): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.212627][T26227] kobject: 'tx-4' (000000000733f971): kobject_uevent_env [ 2679.219714][T26227] kobject: 'tx-4' (000000000733f971): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-4' [ 2679.230741][T26227] kobject: 'tx-5' (000000008e5a1597): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.240961][T26227] kobject: 'tx-5' (000000008e5a1597): kobject_uevent_env [ 2679.248587][T26227] kobject: 'tx-5' (000000008e5a1597): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-5' [ 2679.259639][T26227] kobject: 'tx-6' (0000000067513845): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.269817][T26227] kobject: 'tx-6' (0000000067513845): kobject_uevent_env [ 2679.276845][T26227] kobject: 'tx-6' (0000000067513845): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-6' [ 2679.287911][T26227] kobject: 'tx-7' (00000000bbe129ca): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.298195][T26227] kobject: 'tx-7' (00000000bbe129ca): kobject_uevent_env [ 2679.305243][T26227] kobject: 'tx-7' (00000000bbe129ca): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-7' [ 2679.316326][T26227] kobject: 'tx-8' (00000000bda2d20d): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.326521][T26227] kobject: 'tx-8' (00000000bda2d20d): kobject_uevent_env [ 2679.333634][T26227] kobject: 'tx-8' (00000000bda2d20d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-8' [ 2679.344671][T26227] kobject: 'tx-9' (0000000038ad2d22): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.355109][T26227] kobject: 'tx-9' (0000000038ad2d22): kobject_uevent_env [ 2679.362192][T26227] kobject: 'tx-9' (0000000038ad2d22): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-9' [ 2679.373272][T26227] kobject: 'tx-10' (00000000ea9dd541): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.383551][T26227] kobject: 'tx-10' (00000000ea9dd541): kobject_uevent_env [ 2679.390708][T26227] kobject: 'tx-10' (00000000ea9dd541): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-10' [ 2679.401932][T26227] kobject: 'tx-11' (000000006c052f9c): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.412438][T26227] kobject: 'tx-11' (000000006c052f9c): kobject_uevent_env [ 2679.419619][T26227] kobject: 'tx-11' (000000006c052f9c): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-11' [ 2679.430863][T26227] kobject: 'tx-12' (00000000414c9c23): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.441817][T26227] kobject: 'tx-12' (00000000414c9c23): kobject_uevent_env [ 2679.448997][T26227] kobject: 'tx-12' (00000000414c9c23): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-12' [ 2679.460221][T26227] kobject: 'tx-13' (000000003d598764): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.470486][T26227] kobject: 'tx-13' (000000003d598764): kobject_uevent_env [ 2679.477664][T26227] kobject: 'tx-13' (000000003d598764): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-13' [ 2679.489111][T26227] kobject: 'tx-14' (000000006120a4dc): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.499444][T26227] kobject: 'tx-14' (000000006120a4dc): kobject_uevent_env [ 2679.506580][T26227] kobject: 'tx-14' (000000006120a4dc): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-14' [ 2679.517813][T26227] kobject: 'tx-15' (00000000bdad330a): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.528151][T26227] kobject: 'tx-15' (00000000bdad330a): kobject_uevent_env [ 2679.535286][T26227] kobject: 'tx-15' (00000000bdad330a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-15' [ 2679.547098][T26227] kobject: 'batman_adv' (00000000a71731be): kobject_add_internal: parent: 'team0', set: '' [ 2679.578988][T24743] kobject: 'batman_adv' (0000000092c35a1f): kobject_uevent_env [ 2679.586541][T24743] kobject: 'batman_adv' (0000000092c35a1f): kobject_uevent_env: filter function caused the event to drop! [ 2679.597893][T24743] kobject: 'batman_adv' (0000000092c35a1f): kobject_cleanup, parent 0000000031f5593a [ 2679.607371][T24743] kobject: 'batman_adv' (0000000092c35a1f): calling ktype release [ 2679.615219][T24743] kobject: (0000000092c35a1f): dynamic_kobj_release [ 2679.621843][T24743] kobject: 'batman_adv': free name [ 2679.627084][T24743] kobject: 'rx-0' (00000000ab585c03): kobject_cleanup, parent 000000007b22b569 [ 2679.636067][T24743] kobject: 'rx-0' (00000000ab585c03): auto cleanup 'remove' event [ 2679.643900][T24743] kobject: 'rx-0' (00000000ab585c03): kobject_uevent_env [ 2679.651532][T24743] kobject: 'rx-0' (00000000ab585c03): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2679.662350][T24743] kobject: 'rx-0' (00000000ab585c03): auto cleanup kobject_del [ 2679.670220][T24743] kobject: 'rx-0' (00000000ab585c03): calling ktype release [ 2679.677535][T24743] kobject: 'rx-0': free name [ 2679.682195][T24743] kobject: 'tx-0' (00000000e1ff1141): kobject_cleanup, parent 000000007b22b569 [ 2679.691181][T24743] kobject: 'tx-0' (00000000e1ff1141): auto cleanup 'remove' event [ 2679.699004][T24743] kobject: 'tx-0' (00000000e1ff1141): kobject_uevent_env [ 2679.706008][T24743] kobject: 'tx-0' (00000000e1ff1141): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2679.716885][T24743] kobject: 'tx-0' (00000000e1ff1141): auto cleanup kobject_del [ 2679.724479][T24743] kobject: 'tx-0' (00000000e1ff1141): calling ktype release [ 2679.731773][T24743] kobject: 'tx-0': free name [ 2679.736405][T24743] kobject: 'queues' (000000007b22b569): kobject_cleanup, parent 0000000031f5593a [ 2679.745539][T24743] kobject: 'queues' (000000007b22b569): calling ktype release [ 2679.753028][T24743] kobject: 'queues' (000000007b22b569): kset_release [ 2679.760117][T24743] kobject: 'queues': free name [ 2679.765081][T24743] kobject: 'erspan0' (00000000ec940fa5): kobject_uevent_env [ 2679.772401][T24743] kobject: 'erspan0' (00000000ec940fa5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2679.784351][T26227] kobject: 'dummy0' (00000000955d230b): kobject_add_internal: parent: 'net', set: 'devices' [ 2679.795133][T26227] kobject: 'dummy0' (00000000955d230b): kobject_uevent_env [ 2679.802890][T26227] kobject: 'dummy0' (00000000955d230b): fill_kobj_path: path = '/devices/virtual/net/dummy0' [ 2679.813192][T26227] kobject: 'queues' (0000000020848f6c): kobject_add_internal: parent: 'dummy0', set: '' [ 2679.823636][T26227] kobject: 'queues' (0000000020848f6c): kobject_uevent_env [ 2679.830872][T26227] kobject: 'queues' (0000000020848f6c): kobject_uevent_env: filter function caused the event to drop! [ 2679.841851][T26227] kobject: 'rx-0' (00000000b901d455): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.852002][T26227] kobject: 'rx-0' (00000000b901d455): kobject_uevent_env [ 2679.859105][T26227] kobject: 'rx-0' (00000000b901d455): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/rx-0' [ 2679.870210][T26227] kobject: 'tx-0' (0000000035f29f32): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.880411][T26227] kobject: 'tx-0' (0000000035f29f32): kobject_uevent_env [ 2679.887505][T26227] kobject: 'tx-0' (0000000035f29f32): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/tx-0' [ 2679.899341][T26227] kobject: 'batman_adv' (0000000069626080): kobject_add_internal: parent: 'dummy0', set: '' [ 2679.910513][T24743] kobject: 'erspan0' (00000000ec940fa5): kobject_cleanup, parent 0000000031f5593a [ 2679.910780][T26227] kobject: 'nlmon0' (000000009e40b95f): kobject_add_internal: parent: 'net', set: 'devices' [ 2679.922450][T24743] kobject: 'erspan0' (00000000ec940fa5): calling ktype release [ 2679.930728][T26227] kobject: 'nlmon0' (000000009e40b95f): kobject_uevent_env [ 2679.939843][T24743] kobject: 'erspan0': free name [ 2679.944964][T26227] kobject: 'nlmon0' (000000009e40b95f): fill_kobj_path: path = '/devices/virtual/net/nlmon0' [ 2679.960161][T26227] kobject: 'queues' (00000000eee9f9a7): kobject_add_internal: parent: 'nlmon0', set: '' [ 2679.970750][T26227] kobject: 'queues' (00000000eee9f9a7): kobject_uevent_env [ 2679.978004][T26227] kobject: 'queues' (00000000eee9f9a7): kobject_uevent_env: filter function caused the event to drop! [ 2679.989086][T26227] kobject: 'rx-0' (0000000084dcc83e): kobject_add_internal: parent: 'queues', set: 'queues' [ 2679.999246][T26227] kobject: 'rx-0' (0000000084dcc83e): kobject_uevent_env [ 2680.006378][T26227] kobject: 'rx-0' (0000000084dcc83e): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/rx-0' [ 2680.017734][T26227] kobject: 'tx-0' (00000000c05ce8ca): kobject_add_internal: parent: 'queues', set: 'queues' [ 2680.028269][T26227] kobject: 'tx-0' (00000000c05ce8ca): kobject_uevent_env [ 2680.035308][T26227] kobject: 'tx-0' (00000000c05ce8ca): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/tx-0' [ 2680.069133][T24743] kobject: 'batman_adv' (0000000080321c87): kobject_uevent_env [ 2680.076815][T24743] kobject: 'batman_adv' (0000000080321c87): kobject_uevent_env: filter function caused the event to drop! [ 2680.088488][T24743] kobject: 'batman_adv' (0000000080321c87): kobject_cleanup, parent 0000000031f5593a [ 2680.098000][T24743] kobject: 'batman_adv' (0000000080321c87): calling ktype release [ 2680.105937][T24743] kobject: (0000000080321c87): dynamic_kobj_release [ 2680.112793][T24743] kobject: 'batman_adv': free name [ 2680.118186][T24743] kobject: 'rx-0' (0000000075e02120): kobject_cleanup, parent 00000000140ce5c4 [ 2680.127207][T24743] kobject: 'rx-0' (0000000075e02120): auto cleanup 'remove' event [ 2680.135172][T24743] kobject: 'rx-0' (0000000075e02120): kobject_uevent_env [ 2680.142442][T24743] kobject: 'rx-0' (0000000075e02120): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2680.153220][T24743] kobject: 'rx-0' (0000000075e02120): auto cleanup kobject_del [ 2680.160815][T24743] kobject: 'rx-0' (0000000075e02120): calling ktype release [ 2680.168145][T24743] kobject: 'rx-0': free name [ 2680.172765][T24743] kobject: 'tx-0' (0000000034227025): kobject_cleanup, parent 00000000140ce5c4 [ 2680.181967][T24743] kobject: 'tx-0' (0000000034227025): auto cleanup 'remove' event [ 2680.189819][T24743] kobject: 'tx-0' (0000000034227025): kobject_uevent_env [ 2680.196839][T24743] kobject: 'tx-0' (0000000034227025): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2680.207922][T24743] kobject: 'tx-0' (0000000034227025): auto cleanup kobject_del [ 2680.215514][T24743] kobject: 'tx-0' (0000000034227025): calling ktype release [ 2680.222836][T24743] kobject: 'tx-0': free name [ 2680.227472][T24743] kobject: 'queues' (00000000140ce5c4): kobject_cleanup, parent 0000000031f5593a [ 2680.236702][T24743] kobject: 'queues' (00000000140ce5c4): calling ktype release [ 2680.244181][T24743] kobject: 'queues' (00000000140ce5c4): kset_release [ 2680.250869][T24743] kobject: 'queues': free name [ 2680.255819][T24743] kobject: 'gretap0' (00000000914b0914): kobject_uevent_env [ 2680.263121][T24743] kobject: 'gretap0' (00000000914b0914): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2680.274341][T26227] chnl_net:caif_netlink_parms(): no params data found [ 2680.281262][T26227] kobject: 'caif0' (0000000027d4f81c): kobject_add_internal: parent: 'net', set: 'devices' [ 2680.292718][T26227] kobject: 'caif0' (0000000027d4f81c): kobject_uevent_env [ 2680.300018][T26227] kobject: 'caif0' (0000000027d4f81c): fill_kobj_path: path = '/devices/virtual/net/caif0' [ 2680.311246][T26227] kobject: 'queues' (00000000f3286699): kobject_add_internal: parent: 'caif0', set: '' [ 2680.321458][T26227] kobject: 'queues' (00000000f3286699): kobject_uevent_env [ 2680.328707][T26227] kobject: 'queues' (00000000f3286699): kobject_uevent_env: filter function caused the event to drop! [ 2680.339879][T26227] kobject: 'rx-0' (00000000b4cd6c84): kobject_add_internal: parent: 'queues', set: 'queues' [ 2680.350012][T26227] kobject: 'rx-0' (00000000b4cd6c84): kobject_uevent_env [ 2680.357051][T26227] kobject: 'rx-0' (00000000b4cd6c84): fill_kobj_path: path = '/devices/virtual/net/caif0/queues/rx-0' [ 2680.368237][T26227] kobject: 'tx-0' (00000000c6916400): kobject_add_internal: parent: 'queues', set: 'queues' [ 2680.378472][T26227] kobject: 'tx-0' (00000000c6916400): kobject_uevent_env [ 2680.385532][T26227] kobject: 'tx-0' (00000000c6916400): fill_kobj_path: path = '/devices/virtual/net/caif0/queues/tx-0' [ 2680.397231][T24743] kobject: 'gretap0' (00000000914b0914): kobject_cleanup, parent 0000000031f5593a [ 2680.398462][T26227] kobject: 'batadv0' (000000006f23831d): kobject_add_internal: parent: 'net', set: 'devices' [ 2680.408348][T24743] kobject: 'gretap0' (00000000914b0914): calling ktype release [ 2680.417197][T26227] kobject: 'batadv0' (000000006f23831d): kobject_uevent_env [ 2680.426780][T24743] kobject: 'gretap0': free name [ 2680.431496][T26227] kobject: 'batadv0' (000000006f23831d): fill_kobj_path: path = '/devices/virtual/net/batadv0' [ 2680.446838][T26227] kobject: 'queues' (00000000e841808d): kobject_add_internal: parent: 'batadv0', set: '' [ 2680.457203][T26227] kobject: 'queues' (00000000e841808d): kobject_uevent_env [ 2680.464569][T26227] kobject: 'queues' (00000000e841808d): kobject_uevent_env: filter function caused the event to drop! [ 2680.475555][T26227] kobject: 'rx-0' (00000000b8e9787c): kobject_add_internal: parent: 'queues', set: 'queues' [ 2680.485845][T26227] kobject: 'rx-0' (00000000b8e9787c): kobject_uevent_env [ 2680.492937][T26227] kobject: 'rx-0' (00000000b8e9787c): fill_kobj_path: path = '/devices/virtual/net/batadv0/queues/rx-0' [ 2680.504182][T26227] kobject: 'tx-0' (0000000003c776a8): kobject_add_internal: parent: 'queues', set: 'queues' [ 2680.514370][T26227] kobject: 'tx-0' (0000000003c776a8): kobject_uevent_env [ 2680.521463][T26227] kobject: 'tx-0' (0000000003c776a8): fill_kobj_path: path = '/devices/virtual/net/batadv0/queues/tx-0' [ 2680.533865][T26227] kobject: 'mesh' (00000000f1172ebc): kobject_add_internal: parent: 'batadv0', set: '' [ 2680.565831][T24743] kobject: 'rx-0' (000000009f0672a3): kobject_cleanup, parent 00000000b5dc4cdf [ 2680.574829][T24743] kobject: 'rx-0' (000000009f0672a3): auto cleanup 'remove' event [ 2680.582742][T24743] kobject: 'rx-0' (000000009f0672a3): kobject_uevent_env [ 2680.589787][T24743] kobject: 'rx-0' (000000009f0672a3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2680.600577][T24743] kobject: 'rx-0' (000000009f0672a3): auto cleanup kobject_del [ 2680.608176][T24743] kobject: 'rx-0' (000000009f0672a3): calling ktype release [ 2680.615557][T24743] kobject: 'rx-0': free name [ 2680.620230][T24743] kobject: 'tx-0' (00000000cc1ca536): kobject_cleanup, parent 00000000b5dc4cdf [ 2680.629320][T24743] kobject: 'tx-0' (00000000cc1ca536): auto cleanup 'remove' event [ 2680.637105][T24743] kobject: 'tx-0' (00000000cc1ca536): kobject_uevent_env [ 2680.644167][T24743] kobject: 'tx-0' (00000000cc1ca536): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2680.654962][T24743] kobject: 'tx-0' (00000000cc1ca536): auto cleanup kobject_del [ 2680.662575][T24743] kobject: 'tx-0' (00000000cc1ca536): calling ktype release [ 2680.669883][T24743] kobject: 'tx-0': free name [ 2680.674507][T24743] kobject: 'queues' (00000000b5dc4cdf): kobject_cleanup, parent 0000000031f5593a [ 2680.683632][T24743] kobject: 'queues' (00000000b5dc4cdf): calling ktype release [ 2680.691256][T24743] kobject: 'queues' (00000000b5dc4cdf): kset_release [ 2680.697973][T24743] kobject: 'queues': free name [ 2680.702912][T24743] kobject: 'gre0' (0000000029bfd8de): kobject_uevent_env [ 2680.710243][T24743] kobject: 'gre0' (0000000029bfd8de): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2680.721446][T26227] kobject: 'vxcan0' (00000000f3849d8d): kobject_add_internal: parent: 'net', set: 'devices' [ 2680.731905][T26227] kobject: 'vxcan0' (00000000f3849d8d): kobject_uevent_env [ 2680.739186][T26227] kobject: 'vxcan0' (00000000f3849d8d): fill_kobj_path: path = '/devices/virtual/net/vxcan0' [ 2680.749505][T26227] kobject: 'queues' (00000000fd2b203a): kobject_add_internal: parent: 'vxcan0', set: '' [ 2680.759808][T26227] kobject: 'queues' (00000000fd2b203a): kobject_uevent_env [ 2680.767004][T26227] kobject: 'queues' (00000000fd2b203a): kobject_uevent_env: filter function caused the event to drop! [ 2680.777998][T26227] kobject: 'rx-0' (00000000bba38563): kobject_add_internal: parent: 'queues', set: 'queues' [ 2680.788191][T26227] kobject: 'rx-0' (00000000bba38563): kobject_uevent_env [ 2680.795275][T26227] kobject: 'rx-0' (00000000bba38563): fill_kobj_path: path = '/devices/virtual/net/vxcan0/queues/rx-0' [ 2680.806450][T26227] kobject: 'tx-0' (0000000086796fe2): kobject_add_internal: parent: 'queues', set: 'queues' [ 2680.816649][T26227] kobject: 'tx-0' (0000000086796fe2): kobject_uevent_env [ 2680.823753][T26227] kobject: 'tx-0' (0000000086796fe2): fill_kobj_path: path = '/devices/virtual/net/vxcan0/queues/tx-0' [ 2680.835304][T26227] kobject: 'vxcan1' (00000000407fee0e): kobject_add_internal: parent: 'net', set: 'devices' [ 2680.845924][T26227] kobject: 'vxcan1' (00000000407fee0e): kobject_uevent_env [ 2680.853234][T26227] kobject: 'vxcan1' (00000000407fee0e): fill_kobj_path: path = '/devices/virtual/net/vxcan1' [ 2680.863587][T26227] kobject: 'queues' (00000000a68e6fc6): kobject_add_internal: parent: 'vxcan1', set: '' [ 2680.873904][T26227] kobject: 'queues' (00000000a68e6fc6): kobject_uevent_env [ 2680.881149][T26227] kobject: 'queues' (00000000a68e6fc6): kobject_uevent_env: filter function caused the event to drop! [ 2680.892130][T26227] kobject: 'rx-0' (0000000060a8e8e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 2680.902337][T26227] kobject: 'rx-0' (0000000060a8e8e9): kobject_uevent_env [ 2680.912195][T26227] kobject: 'rx-0' (0000000060a8e8e9): fill_kobj_path: path = '/devices/virtual/net/vxcan1/queues/rx-0' [ 2680.923380][T26227] kobject: 'tx-0' (00000000b97f5a90): kobject_add_internal: parent: 'queues', set: 'queues' [ 2680.933616][T26227] kobject: 'tx-0' (00000000b97f5a90): kobject_uevent_env [ 2680.941295][T26227] kobject: 'tx-0' (00000000b97f5a90): fill_kobj_path: path = '/devices/virtual/net/vxcan1/queues/tx-0' [ 2680.952864][T24743] kobject: 'gre0' (0000000029bfd8de): kobject_cleanup, parent 0000000031f5593a [ 2680.953326][T26227] kobject: 'veth0' (00000000baf2ce4c): kobject_add_internal: parent: 'net', set: 'devices' [ 2680.964737][T24743] kobject: 'gre0' (0000000029bfd8de): calling ktype release [ 2680.972569][T26227] kobject: 'veth0' (00000000baf2ce4c): kobject_uevent_env [ 2680.981941][T24743] kobject: 'gre0': free name [ 2680.986461][T26227] kobject: 'veth0' (00000000baf2ce4c): fill_kobj_path: path = '/devices/virtual/net/veth0' [ 2681.001649][T26227] kobject: 'queues' (000000004e7ed238): kobject_add_internal: parent: 'veth0', set: '' [ 2681.011941][T26227] kobject: 'queues' (000000004e7ed238): kobject_uevent_env [ 2681.019199][T26227] kobject: 'queues' (000000004e7ed238): kobject_uevent_env: filter function caused the event to drop! [ 2681.030216][T26227] kobject: 'rx-0' (00000000922186ff): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.040394][T26227] kobject: 'rx-0' (00000000922186ff): kobject_uevent_env [ 2681.048131][T26227] kobject: 'rx-0' (00000000922186ff): fill_kobj_path: path = '/devices/virtual/net/veth0/queues/rx-0' [ 2681.059175][T26227] kobject: 'tx-0' (00000000792b0b27): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.069432][T26227] kobject: 'tx-0' (00000000792b0b27): kobject_uevent_env [ 2681.076688][T26227] kobject: 'tx-0' (00000000792b0b27): fill_kobj_path: path = '/devices/virtual/net/veth0/queues/tx-0' [ 2681.088608][T26227] kobject: 'batman_adv' (00000000375ea67f): kobject_add_internal: parent: 'veth0', set: '' [ 2681.102692][T26227] kobject: 'veth1' (00000000f59b33b5): kobject_add_internal: parent: 'net', set: 'devices' [ 2681.113201][T26227] kobject: 'veth1' (00000000f59b33b5): kobject_uevent_env [ 2681.120380][T26227] kobject: 'veth1' (00000000f59b33b5): fill_kobj_path: path = '/devices/virtual/net/veth1' [ 2681.130522][T26227] kobject: 'queues' (000000005441382f): kobject_add_internal: parent: 'veth1', set: '' [ 2681.141003][T26227] kobject: 'queues' (000000005441382f): kobject_uevent_env [ 2681.148285][T26227] kobject: 'queues' (000000005441382f): kobject_uevent_env: filter function caused the event to drop! [ 2681.159298][T26227] kobject: 'rx-0' (0000000001c787b7): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.169510][T26227] kobject: 'rx-0' (0000000001c787b7): kobject_uevent_env [ 2681.176577][T26227] kobject: 'rx-0' (0000000001c787b7): fill_kobj_path: path = '/devices/virtual/net/veth1/queues/rx-0' [ 2681.187662][T26227] kobject: 'tx-0' (0000000044b6a602): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.197934][T26227] kobject: 'tx-0' (0000000044b6a602): kobject_uevent_env [ 2681.204978][T26227] kobject: 'tx-0' (0000000044b6a602): fill_kobj_path: path = '/devices/virtual/net/veth1/queues/tx-0' [ 2681.216679][T26227] kobject: 'batman_adv' (0000000085a972c6): kobject_add_internal: parent: 'veth1', set: '' [ 2681.227922][T26227] kobject: 'veth0_to_bridge' (0000000045c33165): kobject_add_internal: parent: 'net', set: 'devices' [ 2681.239442][T26227] kobject: 'veth0_to_bridge' (0000000045c33165): kobject_uevent_env [ 2681.247544][T26227] kobject: 'veth0_to_bridge' (0000000045c33165): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge' [ 2681.259411][T26227] kobject: 'queues' (00000000c93e04e8): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 2681.270597][T26227] kobject: 'queues' (00000000c93e04e8): kobject_uevent_env [ 2681.277819][T26227] kobject: 'queues' (00000000c93e04e8): kobject_uevent_env: filter function caused the event to drop! [ 2681.288812][T26227] kobject: 'rx-0' (0000000031dc3dfb): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.298956][T26227] kobject: 'rx-0' (0000000031dc3dfb): kobject_uevent_env [ 2681.306188][T26227] kobject: 'rx-0' (0000000031dc3dfb): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/rx-0' [ 2681.318139][T26227] kobject: 'tx-0' (000000006a00a2fc): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.328695][T26227] kobject: 'tx-0' (000000006a00a2fc): kobject_uevent_env [ 2681.335755][T26227] kobject: 'tx-0' (000000006a00a2fc): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/tx-0' [ 2681.348368][T26227] kobject: 'batman_adv' (00000000733205a8): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 2681.360315][T26227] kobject: 'bridge_slave_0' (0000000067a893d9): kobject_add_internal: parent: 'net', set: 'devices' [ 2681.371669][T26227] kobject: 'bridge_slave_0' (0000000067a893d9): kobject_uevent_env [ 2681.379641][T26227] kobject: 'bridge_slave_0' (0000000067a893d9): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0' [ 2681.391326][T26227] kobject: 'queues' (00000000fc49a8b9): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 2681.402320][T26227] kobject: 'queues' (00000000fc49a8b9): kobject_uevent_env [ 2681.409830][T26227] kobject: 'queues' (00000000fc49a8b9): kobject_uevent_env: filter function caused the event to drop! [ 2681.421047][T26227] kobject: 'rx-0' (00000000929240d6): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.431216][T26227] kobject: 'rx-0' (00000000929240d6): kobject_uevent_env [ 2681.438316][T26227] kobject: 'rx-0' (00000000929240d6): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0/queues/rx-0' [ 2681.450202][T26227] kobject: 'tx-0' (0000000070b5c658): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.460354][T26227] kobject: 'tx-0' (0000000070b5c658): kobject_uevent_env [ 2681.467473][T26227] kobject: 'tx-0' (0000000070b5c658): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0/queues/tx-0' [ 2681.479815][T26227] kobject: 'batman_adv' (0000000018702059): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 2681.521098][T24743] kobject: 'rx-0' (0000000040ee5bea): kobject_cleanup, parent 00000000b9c296bb [ 2681.530091][T24743] kobject: 'rx-0' (0000000040ee5bea): auto cleanup 'remove' event [ 2681.538002][T24743] kobject: 'rx-0' (0000000040ee5bea): kobject_uevent_env [ 2681.545042][T24743] kobject: 'rx-0' (0000000040ee5bea): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2681.555846][T24743] kobject: 'rx-0' (0000000040ee5bea): auto cleanup kobject_del [ 2681.563573][T24743] kobject: 'rx-0' (0000000040ee5bea): calling ktype release [ 2681.571439][T24743] kobject: 'rx-0': free name [ 2681.576057][T24743] kobject: 'tx-0' (000000007fbe65cb): kobject_cleanup, parent 00000000b9c296bb [ 2681.585131][T24743] kobject: 'tx-0' (000000007fbe65cb): auto cleanup 'remove' event [ 2681.592973][T24743] kobject: 'tx-0' (000000007fbe65cb): kobject_uevent_env [ 2681.600004][T24743] kobject: 'tx-0' (000000007fbe65cb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2681.610772][T24743] kobject: 'tx-0' (000000007fbe65cb): auto cleanup kobject_del [ 2681.618391][T24743] kobject: 'tx-0' (000000007fbe65cb): calling ktype release [ 2681.625654][T24743] kobject: 'tx-0': free name [ 2681.630316][T24743] kobject: 'queues' (00000000b9c296bb): kobject_cleanup, parent 0000000031f5593a [ 2681.639479][T24743] kobject: 'queues' (00000000b9c296bb): calling ktype release [ 2681.646922][T24743] kobject: 'queues' (00000000b9c296bb): kset_release [ 2681.653759][T24743] kobject: 'queues': free name [ 2681.658843][T24743] kobject: 'tunl0' (0000000074a75ac7): kobject_uevent_env [ 2681.666001][T24743] kobject: 'tunl0' (0000000074a75ac7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 2681.677606][T26227] kobject: 'veth1_to_bridge' (000000006366a4ae): kobject_add_internal: parent: 'net', set: 'devices' [ 2681.688822][T26227] kobject: 'veth1_to_bridge' (000000006366a4ae): kobject_uevent_env [ 2681.696800][T26227] kobject: 'veth1_to_bridge' (000000006366a4ae): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge' [ 2681.708631][T26227] kobject: 'queues' (0000000049d585e8): kobject_add_internal: parent: 'veth1_to_bridge', set: '' [ 2681.719720][T26227] kobject: 'queues' (0000000049d585e8): kobject_uevent_env [ 2681.727153][T26227] kobject: 'queues' (0000000049d585e8): kobject_uevent_env: filter function caused the event to drop! [ 2681.739239][T26227] kobject: 'rx-0' (000000000586ac57): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.749364][T26227] kobject: 'rx-0' (000000000586ac57): kobject_uevent_env [ 2681.756390][T26227] kobject: 'rx-0' (000000000586ac57): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge/queues/rx-0' [ 2681.768616][T26227] kobject: 'tx-0' (0000000049bacab4): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.778949][T26227] kobject: 'tx-0' (0000000049bacab4): kobject_uevent_env [ 2681.786008][T26227] kobject: 'tx-0' (0000000049bacab4): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge/queues/tx-0' [ 2681.798801][T26227] kobject: 'batman_adv' (00000000a821d028): kobject_add_internal: parent: 'veth1_to_bridge', set: '' [ 2681.810997][T26227] kobject: 'bridge_slave_1' (00000000946b1486): kobject_add_internal: parent: 'net', set: 'devices' [ 2681.822215][T26227] kobject: 'bridge_slave_1' (00000000946b1486): kobject_uevent_env [ 2681.830127][T26227] kobject: 'bridge_slave_1' (00000000946b1486): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_1' [ 2681.841778][T26227] kobject: 'queues' (000000000c062eff): kobject_add_internal: parent: 'bridge_slave_1', set: '' [ 2681.852749][T26227] kobject: 'queues' (000000000c062eff): kobject_uevent_env [ 2681.859971][T26227] kobject: 'queues' (000000000c062eff): kobject_uevent_env: filter function caused the event to drop! [ 2681.870924][T26227] kobject: 'rx-0' (0000000043de4b04): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.881078][T26227] kobject: 'rx-0' (0000000043de4b04): kobject_uevent_env [ 2681.888129][T26227] kobject: 'rx-0' (0000000043de4b04): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_1/queues/rx-0' [ 2681.900269][T26227] kobject: 'tx-0' (00000000c81e9427): kobject_add_internal: parent: 'queues', set: 'queues' [ 2681.910481][T26227] kobject: 'tx-0' (00000000c81e9427): kobject_uevent_env [ 2681.917560][T26227] kobject: 'tx-0' (00000000c81e9427): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_1/queues/tx-0' [ 2681.929944][T26227] kobject: 'batman_adv' (0000000063deb4b9): kobject_add_internal: parent: 'bridge_slave_1', set: '' [ 2681.941613][T24743] kobject: 'tunl0' (0000000074a75ac7): kobject_cleanup, parent 0000000031f5593a [ 2681.942020][T26227] bridge0: port 1(bridge_slave_0) entered blocking state [ 2681.951061][T24743] kobject: 'tunl0' (0000000074a75ac7): calling ktype release [ 2681.957792][T26227] bridge0: port 1(bridge_slave_0) entered disabled state [ 2681.972663][T26227] kobject: 'brport' (0000000029e851e6): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 2681.979605][T24743] kobject: 'tunl0': free name [ 2681.984294][T26227] device bridge_slave_0 entered promiscuous mode [ 2681.995468][T26227] kobject: 'brport' (0000000029e851e6): kobject_uevent_env [ 2682.003249][T26227] kobject: 'brport' (0000000029e851e6): kobject_uevent_env: filter function caused the event to drop! [ 2682.014878][T24743] kobject: 'mesh' (00000000936fd7a7): kobject_uevent_env [ 2682.023362][T24743] kobject: 'mesh' (00000000936fd7a7): kobject_uevent_env: filter function caused the event to drop! [ 2682.034340][T24743] device bridge_slave_1 left promiscuous mode [ 2682.040635][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2682.118204][T24743] kobject: 'brport' (000000005af8a1b0): kobject_uevent_env [ 2682.125445][T24743] kobject: 'brport' (000000005af8a1b0): kobject_uevent_env: filter function caused the event to drop! [ 2682.136668][T24743] device bridge_slave_0 left promiscuous mode [ 2682.142882][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 2682.177454][ C0] kobject: 'brport' (000000005af8a1b0): kobject_cleanup, parent 0000000031f5593a [ 2682.186583][ C0] kobject: 'brport' (000000005af8a1b0): calling ktype release [ 2682.194090][ C0] kobject: 'brport': free name [ 2682.208280][T24743] kobject: 'brport' (00000000cf6a236e): kobject_uevent_env [ 2682.215558][T24743] kobject: 'brport' (00000000cf6a236e): kobject_uevent_env: filter function caused the event to drop! [ 2682.227464][T24743] kobject: 'brif' (000000005a48a8ea): kobject_cleanup, parent 00000000dceff598 [ 2682.236859][T24743] kobject: 'brif' (000000005a48a8ea): auto cleanup kobject_del [ 2682.245158][T24743] kobject: 'brif' (000000005a48a8ea): calling ktype release [ 2682.252704][ C1] kobject: 'brport' (00000000cf6a236e): kobject_cleanup, parent 0000000031f5593a [ 2682.252710][ C1] kobject: 'brport' (00000000cf6a236e): calling ktype release [ 2682.252729][ C1] kobject: 'brport': free name [ 2682.274580][T24743] kobject: (000000005a48a8ea): dynamic_kobj_release [ 2682.281209][T24743] kobject: 'brif': free name