7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1202.889598][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1202.901949][T19761] device veth1_vlan entered promiscuous mode [ 1202.911531][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 21:38:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1202.958222][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1202.981084][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1203.387838][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:38:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:17 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, 0x0) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:18 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1205.085785][ T8181] tipc: TX() has been purged, node left! [ 1205.219322][T19815] IPVS: ftp: loaded support on port[0] = 21 [ 1205.265777][ T8181] tipc: TX() has been purged, node left! [ 1205.269109][T19815] chnl_net:caif_netlink_parms(): no params data found [ 1205.278655][ T8181] tipc: TX() has been purged, node left! [ 1205.299539][T19815] bridge0: port 1(bridge_slave_0) entered blocking state [ 1205.306718][T19815] bridge0: port 1(bridge_slave_0) entered disabled state [ 1205.314320][T19815] device bridge_slave_0 entered promiscuous mode [ 1205.321848][T19815] bridge0: port 2(bridge_slave_1) entered blocking state [ 1205.329069][T19815] bridge0: port 2(bridge_slave_1) entered disabled state [ 1205.337520][T19815] device bridge_slave_1 entered promiscuous mode [ 1205.353980][T19815] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1205.364731][T19815] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1205.383056][T19815] team0: Port device team_slave_0 added [ 1205.528367][T19815] team0: Port device team_slave_1 added [ 1205.598183][T19815] device hsr_slave_0 entered promiscuous mode [ 1205.646124][T19815] device hsr_slave_1 entered promiscuous mode [ 1205.685818][T19815] debugfs: Directory 'hsr0' with parent '/' already present! [ 1205.952083][T19821] IPVS: ftp: loaded support on port[0] = 21 [ 1205.964849][T19820] IPVS: ftp: loaded support on port[0] = 21 [ 1205.964882][T19822] IPVS: ftp: loaded support on port[0] = 21 [ 1206.093139][T19815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1206.209772][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1206.217881][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1206.256750][T19821] chnl_net:caif_netlink_parms(): no params data found [ 1206.272779][T19815] 8021q: adding VLAN 0 to HW filter on device team0 [ 1206.375067][T19821] bridge0: port 1(bridge_slave_0) entered blocking state [ 1206.382587][T19821] bridge0: port 1(bridge_slave_0) entered disabled state [ 1206.390226][T19821] device bridge_slave_0 entered promiscuous mode [ 1206.397883][T19821] bridge0: port 2(bridge_slave_1) entered blocking state [ 1206.404910][T19821] bridge0: port 2(bridge_slave_1) entered disabled state [ 1206.413059][T19821] device bridge_slave_1 entered promiscuous mode [ 1206.514378][T19821] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1206.525392][T19821] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1206.571684][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1206.580303][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1206.588930][T13361] bridge0: port 1(bridge_slave_0) entered blocking state [ 1206.595981][T13361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1206.603840][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1206.620598][T19822] chnl_net:caif_netlink_parms(): no params data found [ 1206.632943][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1206.643533][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1206.651836][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1206.658863][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1206.666766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1206.752632][T19821] team0: Port device team_slave_0 added [ 1206.762423][T19820] chnl_net:caif_netlink_parms(): no params data found [ 1206.773212][T19821] team0: Port device team_slave_1 added [ 1206.779823][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1206.879281][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1206.887781][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1206.896647][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1206.905273][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1206.914164][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1206.968265][T19821] device hsr_slave_0 entered promiscuous mode [ 1207.026228][T19821] device hsr_slave_1 entered promiscuous mode [ 1207.065840][T19821] debugfs: Directory 'hsr0' with parent '/' already present! [ 1207.087293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1207.095664][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1207.117915][T19822] bridge0: port 1(bridge_slave_0) entered blocking state [ 1207.125088][T19822] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.133078][T19822] device bridge_slave_0 entered promiscuous mode [ 1207.142833][ T8181] device bridge_slave_1 left promiscuous mode [ 1207.149117][ T8181] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.196612][ T8181] device bridge_slave_0 left promiscuous mode [ 1207.202834][ T8181] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.259498][ T8181] device bridge_slave_1 left promiscuous mode [ 1207.265687][ T8181] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.306362][ T8181] device bridge_slave_0 left promiscuous mode [ 1207.312708][ T8181] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.358262][ T8181] device bridge_slave_1 left promiscuous mode [ 1207.364437][ T8181] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.406514][ T8181] device bridge_slave_0 left promiscuous mode [ 1207.412683][ T8181] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.480628][ T8181] device veth1_vlan left promiscuous mode [ 1207.486441][ T8181] device veth0_vlan left promiscuous mode [ 1207.492492][ T8181] device veth1_vlan left promiscuous mode [ 1207.498366][ T8181] device veth0_vlan left promiscuous mode [ 1207.504191][ T8181] device veth1_vlan left promiscuous mode [ 1207.510061][ T8181] device veth0_vlan left promiscuous mode [ 1209.916036][ T8181] device hsr_slave_0 left promiscuous mode [ 1209.985885][ T8181] device hsr_slave_1 left promiscuous mode [ 1210.032331][ T8181] team0 (unregistering): Port device team_slave_1 removed [ 1210.042640][ T8181] team0 (unregistering): Port device team_slave_0 removed [ 1210.052411][ T8181] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1210.109629][ T8181] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1210.177172][ T8181] bond0 (unregistering): Released all slaves [ 1210.406131][ T8181] device hsr_slave_0 left promiscuous mode [ 1210.446178][ T8181] device hsr_slave_1 left promiscuous mode [ 1210.492211][ T8181] team0 (unregistering): Port device team_slave_1 removed [ 1210.502419][ T8181] team0 (unregistering): Port device team_slave_0 removed [ 1210.511909][ T8181] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1210.558724][ T8181] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1210.616897][ T8181] bond0 (unregistering): Released all slaves [ 1210.806116][ T8181] device hsr_slave_0 left promiscuous mode [ 1210.845948][ T8181] device hsr_slave_1 left promiscuous mode [ 1210.892111][ T8181] team0 (unregistering): Port device team_slave_1 removed [ 1210.902063][ T8181] team0 (unregistering): Port device team_slave_0 removed [ 1210.912037][ T8181] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1210.938905][ T8181] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1211.017925][ T8181] bond0 (unregistering): Released all slaves [ 1211.154222][T19820] bridge0: port 1(bridge_slave_0) entered blocking state [ 1211.161315][T19820] bridge0: port 1(bridge_slave_0) entered disabled state [ 1211.169507][T19820] device bridge_slave_0 entered promiscuous mode [ 1211.177094][T19820] bridge0: port 2(bridge_slave_1) entered blocking state [ 1211.184216][T19820] bridge0: port 2(bridge_slave_1) entered disabled state [ 1211.192156][T19820] device bridge_slave_1 entered promiscuous mode [ 1211.199094][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1211.207489][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1211.216217][T19822] bridge0: port 2(bridge_slave_1) entered blocking state [ 1211.223252][T19822] bridge0: port 2(bridge_slave_1) entered disabled state [ 1211.231345][T19822] device bridge_slave_1 entered promiscuous mode [ 1211.247506][T19815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1211.274330][T19822] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1211.290107][T19822] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1211.300555][T19820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1211.311271][T19820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1211.327573][T19815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1211.349145][T19822] team0: Port device team_slave_0 added [ 1211.361303][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1211.368965][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1211.380798][T19822] team0: Port device team_slave_1 added [ 1211.393594][T19820] team0: Port device team_slave_0 added [ 1211.414963][T19820] team0: Port device team_slave_1 added [ 1211.467914][T19822] device hsr_slave_0 entered promiscuous mode [ 1211.516163][T19822] device hsr_slave_1 entered promiscuous mode [ 1211.618269][T19820] device hsr_slave_0 entered promiscuous mode [ 1211.656152][T19820] device hsr_slave_1 entered promiscuous mode [ 1211.715827][T19820] debugfs: Directory 'hsr0' with parent '/' already present! [ 1211.882690][T19821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1211.912761][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1211.924488][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1211.944313][T19821] 8021q: adding VLAN 0 to HW filter on device team0 [ 1211.959422][T19815] device veth0_vlan entered promiscuous mode [ 1211.968682][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1211.976895][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1211.984609][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1211.995456][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1212.039906][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1212.048791][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1212.060087][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1212.068750][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1212.079944][T13361] bridge0: port 1(bridge_slave_0) entered blocking state [ 1212.087019][T13361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1212.094932][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1212.106098][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1212.114478][T13361] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.121556][T13361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1212.131923][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1212.140871][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1212.152156][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1212.160824][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1212.172044][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1212.180694][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1212.193886][T19815] device veth1_vlan entered promiscuous mode [ 1212.205472][T19821] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1212.219008][T19821] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1212.246733][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1212.254824][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1212.265961][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1212.274269][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1212.286124][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1212.294667][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1212.306109][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1212.314861][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1212.339543][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1212.347025][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1212.360800][T19822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1212.370541][T19821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1212.390605][T19822] 8021q: adding VLAN 0 to HW filter on device team0 [ 1212.461227][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1212.469229][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1212.493303][T19820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1212.503165][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1212.512644][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1212.521670][T13361] bridge0: port 1(bridge_slave_0) entered blocking state [ 1212.528739][T13361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1212.537342][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1212.547338][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1212.555724][T13361] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.562790][T13361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1212.583979][T19822] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1212.625527][T19822] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1212.653943][T19820] 8021q: adding VLAN 0 to HW filter on device team0 [ 1212.669683][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1212.680371][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1212.697912][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1212.717012][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1212.725691][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1212.739659][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1212.748923][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1212.757686][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1212.766595][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1212.775331][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1212.786880][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1212.795418][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1212.805430][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1212.823628][T19822] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1212.840031][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1212.857304][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1212.865126][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1212.886251][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1212.894230][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1212.903127][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1212.911845][T13361] bridge0: port 1(bridge_slave_0) entered blocking state [ 1212.919018][T13361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1212.927035][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1212.936352][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1212.944684][T13361] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.951720][T13361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1212.959963][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1212.971649][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1213.002435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1213.011313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1213.020220][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1213.029533][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1213.038918][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1213.047772][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1213.056833][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1213.065915][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1213.087855][T19820] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1213.098347][T19820] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1213.110779][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1213.119580][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1213.128223][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1213.137691][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1213.146293][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1213.154441][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1213.163949][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1213.171741][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1213.180283][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1213.203972][T19821] device veth0_vlan entered promiscuous mode [ 1213.210880][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1213.219563][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1213.233330][T19820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1213.248673][T19821] device veth1_vlan entered promiscuous mode [ 1213.259586][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1213.273199][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1213.284268][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1213.292460][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1213.300963][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1213.310109][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1213.317912][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1213.331698][T19822] device veth0_vlan entered promiscuous mode [ 1213.343781][T19822] device veth1_vlan entered promiscuous mode [ 1213.468514][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1213.499495][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1213.540415][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1213.549163][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1213.581937][T19820] device veth0_vlan entered promiscuous mode [ 1213.598594][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 21:38:28 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:28 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, 0x0) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1213.622910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1213.653327][T19820] device veth1_vlan entered promiscuous mode [ 1214.265835][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1214.273368][T14164] tipc: TX() has been purged, node left! [ 1214.289040][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:38:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:28 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, 0x0) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:29 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1216.207912][T14164] device bridge_slave_1 left promiscuous mode [ 1216.214062][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1216.246534][T14164] device bridge_slave_0 left promiscuous mode [ 1216.252765][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1216.308729][T14164] device veth1_vlan left promiscuous mode [ 1216.314511][T14164] device veth0_vlan left promiscuous mode [ 1217.186186][T14164] device hsr_slave_0 left promiscuous mode [ 1217.225899][T14164] device hsr_slave_1 left promiscuous mode [ 1217.272621][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1217.283621][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1217.293431][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1217.349798][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1217.408827][T14164] bond0 (unregistering): Released all slaves [ 1217.517850][T19929] IPVS: ftp: loaded support on port[0] = 21 [ 1217.517899][T19931] IPVS: ftp: loaded support on port[0] = 21 [ 1217.620970][T19931] chnl_net:caif_netlink_parms(): no params data found [ 1217.642112][T19929] chnl_net:caif_netlink_parms(): no params data found [ 1217.730715][T19931] bridge0: port 1(bridge_slave_0) entered blocking state [ 1217.738527][T19931] bridge0: port 1(bridge_slave_0) entered disabled state [ 1217.749586][T19931] device bridge_slave_0 entered promiscuous mode [ 1217.761508][T19929] bridge0: port 1(bridge_slave_0) entered blocking state [ 1217.772426][T19929] bridge0: port 1(bridge_slave_0) entered disabled state [ 1217.780555][T19929] device bridge_slave_0 entered promiscuous mode [ 1217.791445][T19931] bridge0: port 2(bridge_slave_1) entered blocking state [ 1217.799391][T19931] bridge0: port 2(bridge_slave_1) entered disabled state [ 1217.810297][T19931] device bridge_slave_1 entered promiscuous mode [ 1217.818255][T19929] bridge0: port 2(bridge_slave_1) entered blocking state [ 1217.825385][T19929] bridge0: port 2(bridge_slave_1) entered disabled state [ 1217.836930][T19929] device bridge_slave_1 entered promiscuous mode [ 1217.871753][T19931] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1217.884062][T19929] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1217.898932][T19931] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1217.912373][T19929] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1217.944485][T19929] team0: Port device team_slave_0 added [ 1217.966810][T19931] team0: Port device team_slave_0 added [ 1217.973919][T19929] team0: Port device team_slave_1 added [ 1217.982732][T19931] team0: Port device team_slave_1 added [ 1218.071249][T19931] device hsr_slave_0 entered promiscuous mode [ 1218.146225][T19931] device hsr_slave_1 entered promiscuous mode [ 1218.237709][T19929] device hsr_slave_0 entered promiscuous mode [ 1218.286117][T19929] device hsr_slave_1 entered promiscuous mode [ 1218.325867][T19929] debugfs: Directory 'hsr0' with parent '/' already present! [ 1218.393175][T19931] bridge0: port 2(bridge_slave_1) entered blocking state [ 1218.400278][T19931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1218.407663][T19931] bridge0: port 1(bridge_slave_0) entered blocking state [ 1218.414750][T19931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1218.443825][T19929] bridge0: port 2(bridge_slave_1) entered blocking state [ 1218.451073][T19929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1218.458888][T19929] bridge0: port 1(bridge_slave_0) entered blocking state [ 1218.466017][T19929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1218.502205][T19931] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1218.517900][T19931] 8021q: adding VLAN 0 to HW filter on device team0 [ 1218.531176][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1218.541327][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1218.552142][ T9299] bridge0: port 2(bridge_slave_1) entered disabled state [ 1218.560481][ T9299] bridge0: port 1(bridge_slave_0) entered disabled state [ 1218.569506][ T9299] bridge0: port 2(bridge_slave_1) entered disabled state [ 1218.598492][T19929] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1218.606267][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1218.616199][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1218.624707][T13366] bridge0: port 2(bridge_slave_1) entered blocking state [ 1218.631943][T13366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1218.640292][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1218.649760][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1218.667689][T19931] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1218.678332][T19931] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1218.696842][T19929] 8021q: adding VLAN 0 to HW filter on device team0 [ 1218.704111][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1218.713561][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1218.722879][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1218.731761][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1218.740604][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1218.749399][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1218.758214][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1218.766894][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1218.775080][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1218.783018][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1218.791128][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1218.799352][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1218.818819][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1218.827820][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1218.837840][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 1218.845045][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1218.853087][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1218.861973][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1218.870435][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 1218.877552][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1218.885517][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1218.895522][T14164] tipc: TX() has been purged, node left! [ 1218.901038][T19931] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1218.908535][T14164] tipc: TX() has been purged, node left! [ 1218.915263][T14164] tipc: TX() has been purged, node left! [ 1218.929760][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1218.937648][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1218.945217][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1218.954886][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1218.964027][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1218.973198][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1218.981950][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1218.990911][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1218.999488][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1219.007814][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1219.016707][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1219.025400][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1219.034524][T19929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1219.196387][T19929] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1219.203976][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1219.215174][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1219.320638][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1219.329851][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1219.430009][T19931] device veth0_vlan entered promiscuous mode [ 1219.438066][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1219.446628][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1219.455529][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1219.463575][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1219.477442][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1219.486703][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1219.570055][T19931] device veth1_vlan entered promiscuous mode [ 1219.577510][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1219.599476][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1219.607996][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1219.617078][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1219.625001][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1219.736207][T19929] device veth0_vlan entered promiscuous mode [ 1219.749745][T19929] device veth1_vlan entered promiscuous mode 21:38:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:34 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:34 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:35 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r4, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1220.842465][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1220.858204][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:38:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1220.889135][T14164] device bridge_slave_1 left promiscuous mode [ 1220.895477][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1220.939255][T14164] device bridge_slave_0 left promiscuous mode [ 1220.945661][T14164] bridge0: port 1(bridge_slave_0) entered disabled state 21:38:35 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r4, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1221.029005][T14164] device bridge_slave_1 left promiscuous mode [ 1221.035271][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1221.106391][T14164] device bridge_slave_0 left promiscuous mode [ 1221.112587][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1221.181205][T14164] device bridge_slave_1 left promiscuous mode [ 1221.199876][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1221.288254][T14164] device bridge_slave_0 left promiscuous mode [ 1221.294604][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1221.396104][T14164] device veth1_vlan left promiscuous mode [ 1221.401904][T14164] device veth0_vlan left promiscuous mode [ 1221.410062][T14164] device veth1_vlan left promiscuous mode [ 1221.426174][T14164] device veth0_vlan left promiscuous mode [ 1221.436270][T14164] device veth1_vlan left promiscuous mode [ 1221.442087][T14164] device veth0_vlan left promiscuous mode [ 1224.306128][T14164] device hsr_slave_0 left promiscuous mode [ 1224.346026][T14164] device hsr_slave_1 left promiscuous mode [ 1224.392835][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1224.402927][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1224.413386][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1224.479433][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1224.547655][T14164] bond0 (unregistering): Released all slaves [ 1224.746424][T14164] device hsr_slave_0 left promiscuous mode [ 1224.785880][T14164] device hsr_slave_1 left promiscuous mode [ 1224.842640][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1224.854206][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1224.864984][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1224.921296][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1224.976786][T14164] bond0 (unregistering): Released all slaves [ 1225.246159][T14164] device hsr_slave_0 left promiscuous mode [ 1225.285921][T14164] device hsr_slave_1 left promiscuous mode [ 1225.331989][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1225.342405][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1225.352115][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1225.409617][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1225.508683][T14164] bond0 (unregistering): Released all slaves [ 1225.631003][T19982] IPVS: ftp: loaded support on port[0] = 21 [ 1225.631210][T19987] IPVS: ftp: loaded support on port[0] = 21 [ 1225.642789][T19988] IPVS: ftp: loaded support on port[0] = 21 [ 1225.663698][T19990] IPVS: ftp: loaded support on port[0] = 21 [ 1225.663706][T19989] IPVS: ftp: loaded support on port[0] = 21 [ 1225.877176][T19989] chnl_net:caif_netlink_parms(): no params data found [ 1225.889526][T19987] chnl_net:caif_netlink_parms(): no params data found [ 1225.935917][T19988] chnl_net:caif_netlink_parms(): no params data found [ 1225.977729][T19990] chnl_net:caif_netlink_parms(): no params data found [ 1225.993777][T19982] chnl_net:caif_netlink_parms(): no params data found [ 1226.017600][T19989] bridge0: port 1(bridge_slave_0) entered blocking state [ 1226.024794][T19989] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.035944][T19989] device bridge_slave_0 entered promiscuous mode [ 1226.080634][T19989] bridge0: port 2(bridge_slave_1) entered blocking state [ 1226.088388][T19989] bridge0: port 2(bridge_slave_1) entered disabled state [ 1226.099519][T19989] device bridge_slave_1 entered promiscuous mode [ 1226.120100][T19987] bridge0: port 1(bridge_slave_0) entered blocking state [ 1226.127456][T19987] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.135553][T19987] device bridge_slave_0 entered promiscuous mode [ 1226.153300][T19988] bridge0: port 1(bridge_slave_0) entered blocking state [ 1226.160496][T19988] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.171686][T19988] device bridge_slave_0 entered promiscuous mode [ 1226.179146][T19990] bridge0: port 1(bridge_slave_0) entered blocking state [ 1226.186489][T19990] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.194184][T19990] device bridge_slave_0 entered promiscuous mode [ 1226.201648][T19987] bridge0: port 2(bridge_slave_1) entered blocking state [ 1226.208708][T19987] bridge0: port 2(bridge_slave_1) entered disabled state [ 1226.217015][T19987] device bridge_slave_1 entered promiscuous mode [ 1226.257830][T19989] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1226.268913][T19989] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1226.278414][T19982] bridge0: port 1(bridge_slave_0) entered blocking state [ 1226.285830][T19982] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.293883][T19982] device bridge_slave_0 entered promiscuous mode [ 1226.302010][T19988] bridge0: port 2(bridge_slave_1) entered blocking state [ 1226.309937][T19988] bridge0: port 2(bridge_slave_1) entered disabled state [ 1226.318138][T19988] device bridge_slave_1 entered promiscuous mode [ 1226.329948][T19990] bridge0: port 2(bridge_slave_1) entered blocking state [ 1226.337096][T19990] bridge0: port 2(bridge_slave_1) entered disabled state [ 1226.345090][T19990] device bridge_slave_1 entered promiscuous mode [ 1226.452469][T19982] bridge0: port 2(bridge_slave_1) entered blocking state [ 1226.461924][T19982] bridge0: port 2(bridge_slave_1) entered disabled state [ 1226.471645][T19982] device bridge_slave_1 entered promiscuous mode [ 1226.491255][T19987] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1226.513513][T19988] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1226.530329][T19987] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1226.556639][T19989] team0: Port device team_slave_0 added [ 1226.577262][T19988] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1226.592738][T19990] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1226.607187][T19989] team0: Port device team_slave_1 added [ 1226.614730][T19982] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1226.630758][T19990] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1226.645687][T19987] team0: Port device team_slave_0 added [ 1226.661769][T19982] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1226.687537][T19988] team0: Port device team_slave_0 added [ 1226.693902][T19987] team0: Port device team_slave_1 added [ 1226.736240][T19988] team0: Port device team_slave_1 added [ 1226.808266][T19989] device hsr_slave_0 entered promiscuous mode [ 1226.846148][T19989] device hsr_slave_1 entered promiscuous mode [ 1226.900036][T19989] debugfs: Directory 'hsr0' with parent '/' already present! [ 1226.908619][T19990] team0: Port device team_slave_0 added [ 1226.914980][T19982] team0: Port device team_slave_0 added [ 1226.927193][T19982] team0: Port device team_slave_1 added [ 1226.997888][T19988] device hsr_slave_0 entered promiscuous mode [ 1227.026368][T19988] device hsr_slave_1 entered promiscuous mode [ 1227.075873][T19988] debugfs: Directory 'hsr0' with parent '/' already present! [ 1227.084230][T19990] team0: Port device team_slave_1 added [ 1227.158397][T19982] device hsr_slave_0 entered promiscuous mode [ 1227.206170][T19982] device hsr_slave_1 entered promiscuous mode [ 1227.245831][T19982] debugfs: Directory 'hsr0' with parent '/' already present! [ 1227.307566][T19987] device hsr_slave_0 entered promiscuous mode [ 1227.346045][T19987] device hsr_slave_1 entered promiscuous mode [ 1227.385856][T19987] debugfs: Directory 'hsr0' with parent '/' already present! [ 1227.458399][T19990] device hsr_slave_0 entered promiscuous mode [ 1227.498101][T19990] device hsr_slave_1 entered promiscuous mode [ 1227.535848][T19990] debugfs: Directory 'hsr0' with parent '/' already present! [ 1227.724116][T19989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1227.744318][T19987] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1227.763018][T19988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1227.789902][T19989] 8021q: adding VLAN 0 to HW filter on device team0 [ 1227.826264][T19988] 8021q: adding VLAN 0 to HW filter on device team0 [ 1227.836231][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1227.844400][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1227.853147][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1227.861609][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1227.869422][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1227.877415][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1227.886451][T19987] 8021q: adding VLAN 0 to HW filter on device team0 [ 1227.898166][T19982] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1227.918982][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1227.927645][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1227.936343][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1227.943371][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1227.951451][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1227.960306][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1227.969122][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1227.976184][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1227.983974][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1227.992814][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1228.001463][ T2880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.008490][ T2880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.016750][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1228.025537][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1228.033964][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.041095][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1228.049151][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1228.057845][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1228.066186][ T2880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.073204][ T2880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.081390][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1228.089474][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1228.097659][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1228.109250][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1228.120926][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1228.136570][T19990] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1228.157957][T19982] 8021q: adding VLAN 0 to HW filter on device team0 [ 1228.172222][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1228.181416][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1228.190662][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1228.199437][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1228.208311][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1228.217273][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1228.225511][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1228.234174][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1228.242607][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1228.251580][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1228.259518][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1228.267660][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1228.276854][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1228.285570][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1228.295245][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1228.303905][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1228.312562][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1228.320652][ T9299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1228.343004][T19990] 8021q: adding VLAN 0 to HW filter on device team0 [ 1228.350355][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1228.359530][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1228.369094][T13361] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.376358][T13361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.384221][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1228.393297][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1228.401742][T13361] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.408762][T13361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1228.416999][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1228.426056][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1228.434362][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1228.442764][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1228.450615][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1228.458747][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1228.475860][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1228.484342][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1228.492995][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.500051][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.507976][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1228.517252][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1228.526199][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1228.534721][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1228.543529][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1228.552193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1228.565638][T19989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1228.576908][T19989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1228.595126][T19989] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1228.607558][T19987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1228.632319][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1228.640725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1228.649712][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1228.658397][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1228.667265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1228.676056][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1228.684630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1228.692099][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1228.699649][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1228.708085][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1228.716592][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1228.725091][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1228.733704][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1228.746388][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1228.754868][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1228.765794][T19982] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1228.786079][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1228.793496][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1228.801282][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1228.810245][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1228.818577][T14164] tipc: TX() has been purged, node left! [ 1228.819422][T13361] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.831297][T13361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1228.839200][T14164] tipc: TX() has been purged, node left! [ 1228.851805][T19988] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1228.862480][T19988] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1228.875642][T19982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1228.889413][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1228.899280][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1228.908110][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1228.921794][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1228.930445][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1228.939158][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1228.946720][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1228.954201][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1228.963140][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1228.971658][T13356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.978707][T13356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1228.986825][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1228.995587][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1229.125470][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1229.138361][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1229.147076][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1229.156350][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1229.163798][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1229.172626][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1229.180819][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1229.189955][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1229.200025][T19987] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1229.212834][T19988] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1229.296452][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1229.305314][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1229.314445][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1229.322870][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1229.331303][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1229.340429][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1229.367277][T19990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1229.440370][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1229.449149][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1229.534733][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1229.543103][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1229.560609][T19982] device veth0_vlan entered promiscuous mode [ 1229.569141][T19989] device veth0_vlan entered promiscuous mode [ 1229.579662][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1229.587915][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1229.596723][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1229.605190][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1229.614144][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1229.621989][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1229.629722][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1229.637810][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1229.656550][T19982] device veth1_vlan entered promiscuous mode [ 1229.719082][T19990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1229.751010][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1229.759728][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1229.769032][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1229.778180][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1229.787243][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1229.799449][T19989] device veth1_vlan entered promiscuous mode [ 1229.812718][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1229.821632][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1229.830268][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1229.840893][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1229.849357][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1229.863088][T19988] device veth0_vlan entered promiscuous mode [ 1229.939767][T19988] device veth1_vlan entered promiscuous mode [ 1229.948548][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1229.960875][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1229.970523][T19987] device veth0_vlan entered promiscuous mode [ 1230.086570][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1230.094621][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 21:38:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1230.440120][T19987] device veth1_vlan entered promiscuous mode [ 1230.450152][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1230.466841][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1230.475505][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1230.494849][T19990] device veth0_vlan entered promiscuous mode [ 1230.619618][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1230.628222][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1230.637054][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1230.644762][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1230.664449][T19990] device veth1_vlan entered promiscuous mode [ 1230.801692][T14164] device bridge_slave_1 left promiscuous mode [ 1230.808068][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1230.856777][T14164] device bridge_slave_0 left promiscuous mode [ 1230.863125][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1230.918601][T14164] device bridge_slave_1 left promiscuous mode [ 1230.924792][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1230.976366][T14164] device bridge_slave_0 left promiscuous mode [ 1230.982547][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1231.029748][T14164] device veth1_vlan left promiscuous mode [ 1231.035540][T14164] device veth0_vlan left promiscuous mode [ 1231.041545][T14164] device veth1_vlan left promiscuous mode [ 1231.047493][T14164] device veth0_vlan left promiscuous mode [ 1232.726136][T14164] device hsr_slave_0 left promiscuous mode [ 1232.765849][T14164] device hsr_slave_1 left promiscuous mode [ 1232.832246][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1232.843283][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1232.853318][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1232.890173][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1232.970985][T14164] bond0 (unregistering): Released all slaves [ 1233.196300][T14164] device hsr_slave_0 left promiscuous mode [ 1233.235860][T14164] device hsr_slave_1 left promiscuous mode [ 1233.283065][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1233.293548][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1233.303911][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1233.349577][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1233.450397][T14164] bond0 (unregistering): Released all slaves [ 1233.586124][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1233.594232][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1233.607950][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:38:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:48 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r4, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:48 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r4, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:48 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r4, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:48 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:48 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:38:49 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:38:49 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1236.015827][T14164] tipc: TX() has been purged, node left! [ 1236.175851][T14164] tipc: TX() has been purged, node left! [ 1236.274340][T20071] IPVS: ftp: loaded support on port[0] = 21 [ 1236.315978][T14164] tipc: TX() has been purged, node left! [ 1236.321924][T14164] tipc: TX() has been purged, node left! [ 1236.326214][T20071] chnl_net:caif_netlink_parms(): no params data found [ 1236.334613][T14164] tipc: TX() has been purged, node left! [ 1236.356307][T20071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1236.363556][T20071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1236.371517][T20071] device bridge_slave_0 entered promiscuous mode [ 1236.379028][T20071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1236.386619][T20071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1236.394309][T20071] device bridge_slave_1 entered promiscuous mode [ 1236.411250][T20071] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1236.421949][T20071] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1236.440267][T20071] team0: Port device team_slave_0 added [ 1236.447139][T20071] team0: Port device team_slave_1 added [ 1236.498262][T20071] device hsr_slave_0 entered promiscuous mode [ 1236.536143][T20071] device hsr_slave_1 entered promiscuous mode [ 1236.973834][T20077] IPVS: ftp: loaded support on port[0] = 21 [ 1236.994820][T20079] IPVS: ftp: loaded support on port[0] = 21 [ 1236.994840][T20080] IPVS: ftp: loaded support on port[0] = 21 [ 1237.018819][T20078] IPVS: ftp: loaded support on port[0] = 21 [ 1237.346099][T20071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1237.353159][T20071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1237.360421][T20071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1237.367467][T20071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1237.384855][T13361] bridge0: port 1(bridge_slave_0) entered disabled state [ 1237.393121][T13361] bridge0: port 2(bridge_slave_1) entered disabled state [ 1237.599560][T20079] chnl_net:caif_netlink_parms(): no params data found [ 1237.639755][T20080] chnl_net:caif_netlink_parms(): no params data found [ 1237.783622][T20078] chnl_net:caif_netlink_parms(): no params data found [ 1237.822103][T20071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1237.862423][T20079] bridge0: port 1(bridge_slave_0) entered blocking state [ 1237.871955][T20079] bridge0: port 1(bridge_slave_0) entered disabled state [ 1237.880025][T20079] device bridge_slave_0 entered promiscuous mode [ 1237.887673][T20079] bridge0: port 2(bridge_slave_1) entered blocking state [ 1237.894723][T20079] bridge0: port 2(bridge_slave_1) entered disabled state [ 1237.902736][T20079] device bridge_slave_1 entered promiscuous mode [ 1237.920176][T20080] bridge0: port 1(bridge_slave_0) entered blocking state [ 1237.927238][T20080] bridge0: port 1(bridge_slave_0) entered disabled state [ 1237.935102][T20080] device bridge_slave_0 entered promiscuous mode [ 1237.950704][T20080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1237.957898][T20080] bridge0: port 2(bridge_slave_1) entered disabled state [ 1237.965569][T20080] device bridge_slave_1 entered promiscuous mode [ 1238.111763][T20078] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.119063][T20078] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.126783][T20078] device bridge_slave_0 entered promiscuous mode [ 1238.135876][T20080] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1238.145019][T20077] chnl_net:caif_netlink_parms(): no params data found [ 1238.155973][T20079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1238.165345][T20078] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.175799][T20078] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.183579][T20078] device bridge_slave_1 entered promiscuous mode [ 1238.314316][T20080] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1238.329876][T20071] 8021q: adding VLAN 0 to HW filter on device team0 [ 1238.338536][T20079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1238.362137][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1238.370073][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1238.516694][T20078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1238.534014][T20078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1238.543535][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1238.552413][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1238.561001][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.568077][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1238.585084][T20079] team0: Port device team_slave_0 added [ 1238.598253][T20080] team0: Port device team_slave_0 added [ 1238.730249][T20077] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.738479][T20077] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.749417][T20077] device bridge_slave_0 entered promiscuous mode [ 1238.756731][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1238.765565][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1238.774441][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.781570][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1238.789661][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1238.798630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1238.808454][T20079] team0: Port device team_slave_1 added [ 1238.821011][T20080] team0: Port device team_slave_1 added [ 1238.835018][T20077] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.842147][T20077] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.850159][T20077] device bridge_slave_1 entered promiscuous mode [ 1238.859931][T14164] device bridge_slave_1 left promiscuous mode [ 1238.866341][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.906468][T14164] device bridge_slave_0 left promiscuous mode [ 1238.912695][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.971109][T14164] device bridge_slave_1 left promiscuous mode [ 1238.977437][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1239.016367][T14164] device bridge_slave_0 left promiscuous mode [ 1239.022539][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1239.078839][T14164] device bridge_slave_1 left promiscuous mode [ 1239.085080][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1239.136570][T14164] device bridge_slave_0 left promiscuous mode [ 1239.142808][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1239.199060][T14164] device bridge_slave_1 left promiscuous mode [ 1239.205213][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1239.256327][T14164] device bridge_slave_0 left promiscuous mode [ 1239.262556][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1239.322910][T14164] device bridge_slave_1 left promiscuous mode [ 1239.329255][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1239.356491][T14164] device bridge_slave_0 left promiscuous mode [ 1239.362727][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1239.425900][T14164] device veth1_vlan left promiscuous mode [ 1239.431646][T14164] device veth0_vlan left promiscuous mode [ 1239.437615][T14164] device veth1_vlan left promiscuous mode [ 1239.443336][T14164] device veth0_vlan left promiscuous mode [ 1239.449395][T14164] device veth1_vlan left promiscuous mode [ 1239.455119][T14164] device veth0_vlan left promiscuous mode [ 1239.461071][T14164] device veth1_vlan left promiscuous mode [ 1239.466916][T14164] device veth0_vlan left promiscuous mode [ 1239.472710][T14164] device veth1_vlan left promiscuous mode [ 1239.478940][T14164] device veth0_vlan left promiscuous mode [ 1243.496217][T14164] device hsr_slave_0 left promiscuous mode [ 1243.535824][T14164] device hsr_slave_1 left promiscuous mode [ 1243.581973][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1243.592330][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1243.602392][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1243.659304][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1243.737479][T14164] bond0 (unregistering): Released all slaves [ 1243.936197][T14164] device hsr_slave_0 left promiscuous mode [ 1243.980391][T14164] device hsr_slave_1 left promiscuous mode [ 1244.042437][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1244.052751][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1244.063000][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1244.099259][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1244.158239][T14164] bond0 (unregistering): Released all slaves [ 1244.355950][T14164] device hsr_slave_0 left promiscuous mode [ 1244.395811][T14164] device hsr_slave_1 left promiscuous mode [ 1244.452743][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1244.463072][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1244.473655][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1244.518577][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1244.597735][T14164] bond0 (unregistering): Released all slaves [ 1244.776342][T14164] device hsr_slave_0 left promiscuous mode [ 1244.825842][T14164] device hsr_slave_1 left promiscuous mode [ 1244.903028][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1244.913063][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1244.923599][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1244.959712][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1245.038017][T14164] bond0 (unregistering): Released all slaves [ 1245.257146][T14164] device hsr_slave_0 left promiscuous mode [ 1245.296064][T14164] device hsr_slave_1 left promiscuous mode [ 1245.351703][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1245.362213][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1245.372136][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1245.428430][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1245.527245][T14164] bond0 (unregistering): Released all slaves [ 1245.640182][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1245.648626][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1245.657124][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1245.665842][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1245.674433][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1245.683646][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1245.692301][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1245.703929][T20071] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1245.715399][T20071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1245.724383][T20078] team0: Port device team_slave_0 added [ 1245.742976][T20077] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1245.755944][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1245.764386][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1245.786976][T20078] team0: Port device team_slave_1 added [ 1245.794101][T20077] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1245.848255][T20079] device hsr_slave_0 entered promiscuous mode [ 1245.886177][T20079] device hsr_slave_1 entered promiscuous mode [ 1245.935950][T20079] debugfs: Directory 'hsr0' with parent '/' already present! [ 1245.998169][T20078] device hsr_slave_0 entered promiscuous mode [ 1246.056309][T20078] device hsr_slave_1 entered promiscuous mode [ 1246.095849][T20078] debugfs: Directory 'hsr0' with parent '/' already present! [ 1246.167758][T20080] device hsr_slave_0 entered promiscuous mode [ 1246.196259][T20080] device hsr_slave_1 entered promiscuous mode [ 1246.235849][T20080] debugfs: Directory 'hsr0' with parent '/' already present! [ 1246.286764][T20071] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1246.298948][T20077] team0: Port device team_slave_0 added [ 1246.314024][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1246.321751][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1246.333086][T20077] team0: Port device team_slave_1 added [ 1246.377866][T20077] device hsr_slave_0 entered promiscuous mode [ 1246.426288][T20077] device hsr_slave_1 entered promiscuous mode [ 1246.485871][T20077] debugfs: Directory 'hsr0' with parent '/' already present! [ 1246.556088][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1246.564515][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1246.604555][T20079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1246.631729][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1246.639960][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1246.649405][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1246.657635][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1246.666896][T20071] device veth0_vlan entered promiscuous mode [ 1246.695842][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1246.703633][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1246.714400][T20071] device veth1_vlan entered promiscuous mode [ 1246.730628][T20078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1246.739950][T20077] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1246.750410][T20079] 8021q: adding VLAN 0 to HW filter on device team0 [ 1246.766870][T20080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1246.822147][T20078] 8021q: adding VLAN 0 to HW filter on device team0 [ 1246.837308][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1246.850471][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1246.859243][T13356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.866351][T13356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1246.874318][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1246.883260][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1246.891723][T13356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.898826][T13356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1246.906674][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1246.914532][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1246.922565][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:39:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1247.011718][T20077] 8021q: adding VLAN 0 to HW filter on device team0 [ 1247.125900][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1247.133682][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1247.165035][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1247.179441][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1247.187925][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1247.206220][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1247.239433][T10529] bridge0: port 1(bridge_slave_0) entered blocking state [ 1247.246535][T10529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1247.279785][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1247.296775][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1247.305428][T10529] bridge0: port 2(bridge_slave_1) entered blocking state [ 1247.312508][T10529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1247.345483][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1247.364130][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1247.373510][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1247.382986][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1247.392130][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1247.401230][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1247.422307][T20079] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1247.434892][T20079] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1247.452133][T20080] 8021q: adding VLAN 0 to HW filter on device team0 [ 1247.469597][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1247.477780][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1247.489424][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1247.498693][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1247.511047][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1247.519780][T10529] bridge0: port 1(bridge_slave_0) entered blocking state [ 1247.526872][T10529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1247.538215][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1247.548361][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1247.559245][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1247.568864][T10529] bridge0: port 2(bridge_slave_1) entered blocking state [ 1247.575916][T10529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1247.587232][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1247.597856][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1247.607694][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1247.616275][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1247.624694][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1247.633656][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1247.642506][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1247.651104][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1247.660058][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1247.668430][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1247.677287][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1247.685264][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1247.692960][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1247.713841][T20078] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1247.739784][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1247.749140][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1247.758679][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1247.768147][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1247.776943][T13361] bridge0: port 1(bridge_slave_0) entered blocking state [ 1247.783982][T13361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1247.791839][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1247.800825][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1247.809274][T13361] bridge0: port 2(bridge_slave_1) entered blocking state [ 1247.816302][T13361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1247.824422][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1247.833139][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1247.841717][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1247.850954][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1247.870718][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1247.880003][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1247.888905][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1247.897728][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1247.906360][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1247.915046][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1247.923807][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1247.932478][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1247.940922][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1247.949472][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1247.958043][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1247.966981][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1247.975242][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1247.988151][T20080] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1247.999591][T20080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1248.014250][T20078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1248.023949][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1248.032748][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1248.042531][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1248.050251][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1248.057746][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1248.066208][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1248.074401][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1248.081837][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1248.092821][T20079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1248.110962][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1248.118535][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1248.126782][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1248.135488][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1248.147801][T20080] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1248.160440][T20077] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1248.183209][T20077] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1248.199363][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1248.207879][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1248.251109][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1248.263591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1248.282422][T20078] device veth0_vlan entered promiscuous mode [ 1248.299339][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1248.314953][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1248.335909][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1248.343719][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1248.366546][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1248.375512][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1248.386695][T20078] device veth1_vlan entered promiscuous mode [ 1248.415257][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1248.429054][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1248.437255][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1248.445918][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1248.481476][T20080] device veth0_vlan entered promiscuous mode [ 1248.491799][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1248.500858][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1248.512891][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1248.521471][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1248.554660][T20079] device veth0_vlan entered promiscuous mode [ 1248.587026][T20077] device veth0_vlan entered promiscuous mode [ 1248.593653][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1248.641482][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1248.659458][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1248.690010][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1248.708465][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1248.717062][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1248.726537][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1248.734457][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1248.756904][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1248.766350][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1248.779395][T20077] device veth1_vlan entered promiscuous mode [ 1248.796057][T20080] device veth1_vlan entered promiscuous mode [ 1248.811158][T20079] device veth1_vlan entered promiscuous mode 21:39:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:03 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:03 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fd"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1249.349856][T14164] tipc: TX() has been purged, node left! 21:39:04 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:04 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:04 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fd"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fd"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:04 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1251.458160][T14164] device bridge_slave_1 left promiscuous mode [ 1251.464387][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1251.516708][T14164] device bridge_slave_0 left promiscuous mode [ 1251.522920][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1251.558823][T14164] device veth1_vlan left promiscuous mode [ 1251.564571][T14164] device veth0_vlan left promiscuous mode [ 1252.466077][T14164] device hsr_slave_0 left promiscuous mode [ 1252.518194][T14164] device hsr_slave_1 left promiscuous mode [ 1252.551844][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1252.562574][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1252.572885][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1252.649160][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1252.729299][T14164] bond0 (unregistering): Released all slaves [ 1252.840539][T20189] IPVS: ftp: loaded support on port[0] = 21 [ 1252.840636][T20190] IPVS: ftp: loaded support on port[0] = 21 [ 1252.847726][T20186] IPVS: ftp: loaded support on port[0] = 21 [ 1253.018873][T20190] chnl_net:caif_netlink_parms(): no params data found [ 1253.036227][T20189] chnl_net:caif_netlink_parms(): no params data found [ 1253.121273][T20186] chnl_net:caif_netlink_parms(): no params data found [ 1253.135180][T20190] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.143125][T20190] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.154779][T20190] device bridge_slave_0 entered promiscuous mode [ 1253.162379][T20189] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.173832][T20189] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.182187][T20189] device bridge_slave_0 entered promiscuous mode [ 1253.196883][T20190] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.203980][T20190] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.216672][T20190] device bridge_slave_1 entered promiscuous mode [ 1253.226971][T20189] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.234018][T20189] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.246293][T20189] device bridge_slave_1 entered promiscuous mode [ 1253.276476][T20190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1253.305025][T20190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1253.325510][T20189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1253.335783][T20186] bridge0: port 1(bridge_slave_0) entered blocking state [ 1253.342919][T20186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.351737][T20186] device bridge_slave_0 entered promiscuous mode [ 1253.366414][T20189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1253.390445][T20186] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.401929][T20186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.410232][T20186] device bridge_slave_1 entered promiscuous mode [ 1253.423795][T20190] team0: Port device team_slave_0 added [ 1253.436028][T20189] team0: Port device team_slave_0 added [ 1253.453003][T20190] team0: Port device team_slave_1 added [ 1253.459762][T20189] team0: Port device team_slave_1 added [ 1253.470184][T20186] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1253.481097][T20186] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1253.537049][T20186] team0: Port device team_slave_0 added [ 1253.577888][T20189] device hsr_slave_0 entered promiscuous mode [ 1253.616257][T20189] device hsr_slave_1 entered promiscuous mode [ 1253.665850][T20189] debugfs: Directory 'hsr0' with parent '/' already present! [ 1253.708759][T20190] device hsr_slave_0 entered promiscuous mode [ 1253.746358][T20190] device hsr_slave_1 entered promiscuous mode [ 1253.785944][T20190] debugfs: Directory 'hsr0' with parent '/' already present! [ 1253.795454][T20186] team0: Port device team_slave_1 added [ 1253.858443][T20186] device hsr_slave_0 entered promiscuous mode [ 1253.906187][T20186] device hsr_slave_1 entered promiscuous mode [ 1253.965983][T20186] debugfs: Directory 'hsr0' with parent '/' already present! [ 1254.108577][T20189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1254.121123][T20186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1254.130946][T20190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1254.143361][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1254.151599][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1254.161656][T20189] 8021q: adding VLAN 0 to HW filter on device team0 [ 1254.166004][ T829] tipc: TX() has been purged, node left! [ 1254.174421][ T829] tipc: TX() has been purged, node left! [ 1254.175306][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1254.188599][ T829] tipc: TX() has been purged, node left! [ 1254.189048][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1254.202724][ T829] tipc: TX() has been purged, node left! [ 1254.203035][T10529] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.215545][T10529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1254.223623][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1254.232208][T10529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1254.240720][T10529] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.247891][T10529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1254.267486][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1254.275621][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1254.284746][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1254.293748][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1254.302307][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1254.314835][T20190] 8021q: adding VLAN 0 to HW filter on device team0 [ 1254.327678][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1254.335413][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1254.343171][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1254.352052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1254.361001][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1254.372646][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1254.382186][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1254.393668][T20186] 8021q: adding VLAN 0 to HW filter on device team0 [ 1254.404458][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1254.413270][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1254.422370][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.429422][ T7941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1254.437553][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1254.446652][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1254.455253][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.462474][ T7941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1254.679641][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1254.689286][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1254.697915][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1254.706892][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1254.715172][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1254.724037][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1254.732620][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.739744][ T7941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1254.747737][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1254.756158][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1254.765170][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1254.773880][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1254.783167][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1254.791750][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1254.800447][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1254.809182][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1254.817991][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1254.826558][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1254.835654][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1254.852274][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1254.862231][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1254.871029][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1254.879562][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.886632][ T7941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1254.894478][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1254.903601][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1254.911973][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1254.927475][T20190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1255.040162][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1255.049513][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1255.058242][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1255.181576][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1255.189688][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1255.197405][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1255.204843][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1255.213646][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1255.222686][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1255.231006][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1255.239565][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1255.247190][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1255.254603][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1255.262977][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1255.275493][T20190] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1255.286463][T20186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1255.401600][T20189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1255.420927][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1255.429448][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1255.542349][T20186] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1255.686602][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1255.695307][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1255.718078][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1255.727259][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1255.841562][T20190] device veth0_vlan entered promiscuous mode [ 1255.852386][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1255.861057][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1255.870069][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1255.878375][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1255.887578][T20189] device veth0_vlan entered promiscuous mode [ 1255.899407][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1255.907582][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1255.915329][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1255.923486][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1255.934650][T20190] device veth1_vlan entered promiscuous mode [ 1256.036026][T20189] device veth1_vlan entered promiscuous mode [ 1256.047264][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1256.055341][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1256.239234][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1256.252688][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1256.304523][ T829] device bridge_slave_1 left promiscuous mode [ 1256.311386][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 1256.360350][ T829] device bridge_slave_0 left promiscuous mode [ 1256.367728][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 1256.428413][ T829] device bridge_slave_1 left promiscuous mode [ 1256.434563][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 1256.476381][ T829] device bridge_slave_0 left promiscuous mode [ 1256.482512][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 1256.558585][ T829] device bridge_slave_1 left promiscuous mode [ 1256.564778][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 1256.626484][ T829] device bridge_slave_0 left promiscuous mode [ 1256.632660][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 1256.688685][ T829] device bridge_slave_1 left promiscuous mode [ 1256.694925][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 1256.726342][ T829] device bridge_slave_0 left promiscuous mode [ 1256.732492][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 1256.792461][ T829] device veth1_vlan left promiscuous mode [ 1256.798352][ T829] device veth0_vlan left promiscuous mode [ 1256.804196][ T829] device veth1_vlan left promiscuous mode [ 1256.810432][ T829] device veth0_vlan left promiscuous mode [ 1256.816402][ T829] device veth1_vlan left promiscuous mode [ 1256.822211][ T829] device veth0_vlan left promiscuous mode [ 1256.828493][ T829] device veth1_vlan left promiscuous mode [ 1256.834385][ T829] device veth0_vlan left promiscuous mode [ 1260.026024][ T829] device hsr_slave_0 left promiscuous mode [ 1260.075967][ T829] device hsr_slave_1 left promiscuous mode [ 1260.122451][ T829] team0 (unregistering): Port device team_slave_1 removed [ 1260.132503][ T829] team0 (unregistering): Port device team_slave_0 removed [ 1260.143078][ T829] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1260.189577][ T829] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1260.247680][ T829] bond0 (unregistering): Released all slaves [ 1260.476120][ T829] device hsr_slave_0 left promiscuous mode [ 1260.536237][ T829] device hsr_slave_1 left promiscuous mode [ 1260.582541][ T829] team0 (unregistering): Port device team_slave_1 removed [ 1260.592495][ T829] team0 (unregistering): Port device team_slave_0 removed [ 1260.602965][ T829] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1260.641478][ T829] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1260.718757][ T829] bond0 (unregistering): Released all slaves [ 1260.916196][ T829] device hsr_slave_0 left promiscuous mode [ 1260.955902][ T829] device hsr_slave_1 left promiscuous mode [ 1261.002222][ T829] team0 (unregistering): Port device team_slave_1 removed [ 1261.012308][ T829] team0 (unregistering): Port device team_slave_0 removed [ 1261.022277][ T829] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1261.079810][ T829] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1261.138283][ T829] bond0 (unregistering): Released all slaves [ 1261.356540][ T829] device hsr_slave_0 left promiscuous mode [ 1261.405834][ T829] device hsr_slave_1 left promiscuous mode [ 1261.452662][ T829] team0 (unregistering): Port device team_slave_1 removed [ 1261.462571][ T829] team0 (unregistering): Port device team_slave_0 removed [ 1261.473355][ T829] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1261.499012][ T829] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1261.580674][ T829] bond0 (unregistering): Released all slaves [ 1261.678557][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1261.686816][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1261.695598][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1261.703420][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1261.711821][T20186] device veth0_vlan entered promiscuous mode [ 1261.844868][T20186] device veth1_vlan entered promiscuous mode 21:39:16 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:16 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:16 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x8004ae98, &(0x7f0000000380)={0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) 21:39:16 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:17 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:17 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:17 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') socket(0x0, 0x0, 0x0) setuid(0x0) ioprio_get$uid(0x3, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}]}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r2, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r4, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:18 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') socket(0x0, 0x0, 0x0) setuid(0x0) ioprio_get$uid(0x3, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}]}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r2, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r4, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1264.212165][T20264] IPVS: ftp: loaded support on port[0] = 21 [ 1264.261365][T20264] chnl_net:caif_netlink_parms(): no params data found [ 1264.288665][T20264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1264.296239][T20264] bridge0: port 1(bridge_slave_0) entered disabled state [ 1264.303988][T20264] device bridge_slave_0 entered promiscuous mode [ 1264.311902][T20264] bridge0: port 2(bridge_slave_1) entered blocking state [ 1264.319305][T20264] bridge0: port 2(bridge_slave_1) entered disabled state [ 1264.327386][T20264] device bridge_slave_1 entered promiscuous mode [ 1264.343874][T20264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1264.354252][T20264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1264.372171][T20264] team0: Port device team_slave_0 added [ 1264.378799][T20264] team0: Port device team_slave_1 added [ 1264.448038][T20264] device hsr_slave_0 entered promiscuous mode [ 1264.466907][ T829] tipc: TX() has been purged, node left! [ 1264.472699][ T829] tipc: TX() has been purged, node left! [ 1264.478706][T20264] device hsr_slave_1 entered promiscuous mode [ 1264.484956][ T829] tipc: TX() has been purged, node left! [ 1264.545867][T20264] bridge0: port 2(bridge_slave_1) entered blocking state [ 1264.553035][T20264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1264.560363][T20264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1264.567399][T20264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1264.595577][T20264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1264.606692][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1264.614909][ T7941] bridge0: port 1(bridge_slave_0) entered disabled state [ 1264.623364][ T7941] bridge0: port 2(bridge_slave_1) entered disabled state [ 1264.632615][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1264.780420][T20264] 8021q: adding VLAN 0 to HW filter on device team0 [ 1264.790940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1264.799341][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1264.806453][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1264.817317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1264.826391][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1264.833421][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1264.931912][T20264] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1264.942590][T20264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1264.955748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1264.964773][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1264.973610][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1264.982438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1264.990744][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1264.998560][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1265.084995][T20264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1265.092964][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1265.100837][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1265.413318][T20276] IPVS: ftp: loaded support on port[0] = 21 [ 1265.422671][T20275] IPVS: ftp: loaded support on port[0] = 21 [ 1265.425676][T20277] IPVS: ftp: loaded support on port[0] = 21 [ 1265.433219][T20274] IPVS: ftp: loaded support on port[0] = 21 [ 1265.567797][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1265.576968][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1265.733477][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1265.741901][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1265.750791][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1265.758544][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1265.843055][T20264] device veth0_vlan entered promiscuous mode [ 1265.881751][T20264] device veth1_vlan entered promiscuous mode [ 1266.013772][T20276] chnl_net:caif_netlink_parms(): no params data found [ 1266.044503][T20274] chnl_net:caif_netlink_parms(): no params data found [ 1266.057286][T20275] chnl_net:caif_netlink_parms(): no params data found [ 1266.086298][T20277] chnl_net:caif_netlink_parms(): no params data found [ 1266.128209][ T829] device bridge_slave_1 left promiscuous mode [ 1266.134624][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.166364][ T829] device bridge_slave_0 left promiscuous mode [ 1266.172648][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.228687][ T829] device bridge_slave_1 left promiscuous mode [ 1266.234874][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.267050][ T829] device bridge_slave_0 left promiscuous mode [ 1266.273406][ T829] bridge0: port 1(bridge_slave_0) entered disabled state 21:39:20 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) socket$inet_dccp(0x2, 0x6, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 21:39:20 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') socket(0x0, 0x0, 0x0) setuid(0x0) ioprio_get$uid(0x3, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}]}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r4) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r2, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r4, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1266.328453][ T829] device bridge_slave_1 left promiscuous mode [ 1266.334598][ T829] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.376491][ T829] device bridge_slave_0 left promiscuous mode [ 1266.382682][ T829] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.452245][ T829] device veth1_vlan left promiscuous mode [ 1266.458166][ T829] device veth0_vlan left promiscuous mode [ 1266.464073][ T829] device veth1_vlan left promiscuous mode [ 1266.474430][ T829] device veth0_vlan left promiscuous mode [ 1266.480522][ T829] device veth1_vlan left promiscuous mode [ 1266.491157][ T829] device veth0_vlan left promiscuous mode [ 1269.056164][ T829] device hsr_slave_0 left promiscuous mode [ 1269.105883][ T829] device hsr_slave_1 left promiscuous mode [ 1269.182356][ T829] team0 (unregistering): Port device team_slave_1 removed [ 1269.192763][ T829] team0 (unregistering): Port device team_slave_0 removed [ 1269.202571][ T829] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1269.249054][ T829] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1269.327629][ T829] bond0 (unregistering): Released all slaves [ 1269.585956][ T829] device hsr_slave_0 left promiscuous mode [ 1269.635855][ T829] device hsr_slave_1 left promiscuous mode [ 1269.702477][ T829] team0 (unregistering): Port device team_slave_1 removed [ 1269.712480][ T829] team0 (unregistering): Port device team_slave_0 removed [ 1269.723287][ T829] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1269.759898][ T829] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1269.838972][ T829] bond0 (unregistering): Released all slaves [ 1270.086334][ T829] device hsr_slave_0 left promiscuous mode [ 1270.125864][ T829] device hsr_slave_1 left promiscuous mode [ 1270.192511][ T829] team0 (unregistering): Port device team_slave_1 removed [ 1270.202508][ T829] team0 (unregistering): Port device team_slave_0 removed [ 1270.213512][ T829] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1270.249211][ T829] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1270.308200][ T829] bond0 (unregistering): Released all slaves [ 1270.429438][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1270.437448][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1270.494420][T20275] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.501532][T20275] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.509193][T20275] device bridge_slave_0 entered promiscuous mode [ 1270.521733][T20277] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.528841][T20277] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.540951][T20277] device bridge_slave_0 entered promiscuous mode [ 1270.552350][T20277] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.559433][T20277] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.567167][T20277] device bridge_slave_1 entered promiscuous mode [ 1270.579544][T20275] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.588204][T20275] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.596137][T20275] device bridge_slave_1 entered promiscuous mode [ 1270.603139][T20274] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.610186][T20274] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.618157][T20274] device bridge_slave_0 entered promiscuous mode [ 1270.625590][T20274] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.632834][T20274] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.640614][T20274] device bridge_slave_1 entered promiscuous mode [ 1270.669835][T20277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1270.684423][T20277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1270.694809][T20276] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.702130][T20276] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.710203][T20276] device bridge_slave_0 entered promiscuous mode [ 1270.718719][T20274] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1270.737935][T20274] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1270.762712][T20276] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.769913][T20276] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.778096][T20276] device bridge_slave_1 entered promiscuous mode [ 1270.791515][T20275] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1270.805219][T20275] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1270.815038][T20274] team0: Port device team_slave_0 added [ 1270.833748][T20276] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1270.848504][T20274] team0: Port device team_slave_1 added [ 1270.860294][T20277] team0: Port device team_slave_0 added [ 1270.869267][T20276] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1270.879210][T20275] team0: Port device team_slave_0 added [ 1270.886923][T20275] team0: Port device team_slave_1 added [ 1270.903107][T20277] team0: Port device team_slave_1 added [ 1270.968441][T20275] device hsr_slave_0 entered promiscuous mode [ 1271.026312][T20275] device hsr_slave_1 entered promiscuous mode [ 1271.068855][T20275] debugfs: Directory 'hsr0' with parent '/' already present! [ 1271.081040][T20276] team0: Port device team_slave_0 added [ 1271.088387][T20276] team0: Port device team_slave_1 added [ 1271.137645][T20274] device hsr_slave_0 entered promiscuous mode [ 1271.186138][T20274] device hsr_slave_1 entered promiscuous mode [ 1271.235793][T20274] debugfs: Directory 'hsr0' with parent '/' already present! [ 1271.277817][T20277] device hsr_slave_0 entered promiscuous mode [ 1271.316130][T20277] device hsr_slave_1 entered promiscuous mode [ 1271.355792][T20277] debugfs: Directory 'hsr0' with parent '/' already present! [ 1271.448344][T20276] device hsr_slave_0 entered promiscuous mode [ 1271.496082][T20276] device hsr_slave_1 entered promiscuous mode [ 1271.545861][T20276] debugfs: Directory 'hsr0' with parent '/' already present! [ 1271.856345][T20275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1271.874092][T20277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1271.891060][T20274] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1271.913682][T20277] 8021q: adding VLAN 0 to HW filter on device team0 [ 1271.932568][T20276] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1271.946555][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1271.954590][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1271.971392][T20274] 8021q: adding VLAN 0 to HW filter on device team0 [ 1272.000037][T20275] 8021q: adding VLAN 0 to HW filter on device team0 [ 1272.008240][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1272.026479][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1272.034822][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1272.041902][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1272.049901][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1272.058116][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1272.066393][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1272.075007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1272.083933][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1272.090982][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1272.099628][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1272.107537][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1272.132692][T20276] 8021q: adding VLAN 0 to HW filter on device team0 [ 1272.149854][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1272.158037][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1272.167957][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1272.178930][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1272.188197][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1272.197523][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1272.209733][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1272.218795][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1272.230798][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1272.239529][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1272.250865][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1272.259490][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1272.270609][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1272.278705][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1272.290614][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1272.299651][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1272.306709][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1272.318057][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1272.326789][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1272.335234][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1272.342375][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1272.350490][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1272.359342][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1272.367910][ T2880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1272.375045][ T2880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1272.382937][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1272.391654][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1272.400037][ T2880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1272.407130][ T2880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1272.417153][T20277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1272.438852][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1272.456825][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1272.464734][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1272.486741][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1272.495297][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1272.503817][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1272.510898][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1272.519393][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1272.528562][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1272.538233][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1272.547750][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1272.556872][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1272.565604][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1272.574334][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1272.583000][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1272.592315][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1272.600697][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1272.609131][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1272.627994][T20277] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1272.645433][T20274] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1272.660564][T20274] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1272.673015][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1272.683554][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1272.691119][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1272.702450][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1272.711089][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1272.719811][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1272.728253][T13359] bridge0: port 2(bridge_slave_1) entered blocking state [ 1272.735266][T13359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1272.743217][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1272.751800][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1272.760245][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1272.769059][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1272.777861][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1272.786281][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1272.796373][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1272.804159][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1272.812895][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1272.835701][T20275] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1272.846639][T20275] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1272.860030][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1272.868867][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1272.878006][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1272.887728][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1272.896515][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1272.904790][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1272.913977][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1272.922663][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1272.931693][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1272.940053][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1272.961622][T20276] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1272.975480][T20276] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1273.006946][T20275] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1273.014547][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1273.028158][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1273.038527][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1273.049114][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1273.059030][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1273.068594][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1273.077700][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1273.095421][T20276] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1273.112804][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1273.125969][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1273.133380][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1273.164540][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1273.185985][T20274] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1273.195393][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1273.203506][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1273.211404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1273.220883][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1273.230854][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1273.242530][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1273.250791][T20277] device veth0_vlan entered promiscuous mode [ 1273.270656][T20277] device veth1_vlan entered promiscuous mode [ 1273.287524][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1273.295629][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1273.305700][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1273.327435][T20275] device veth0_vlan entered promiscuous mode [ 1273.334904][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1273.344701][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1273.353558][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1273.362273][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1273.370985][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1273.379495][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1273.390977][T20275] device veth1_vlan entered promiscuous mode [ 1273.416589][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1273.424696][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1273.433599][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1273.442429][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1273.451420][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1273.460425][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1273.469546][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1273.478096][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1273.488172][T20276] device veth0_vlan entered promiscuous mode [ 1273.511884][T20276] device veth1_vlan entered promiscuous mode [ 1273.520161][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1273.528627][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1273.546696][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1273.554889][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1273.580903][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1273.590011][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1273.607223][T20274] device veth0_vlan entered promiscuous mode [ 1273.622800][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1273.633159][T20274] device veth1_vlan entered promiscuous mode 21:39:28 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000500)) 21:39:28 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:28 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) socket$inet_dccp(0x2, 0x6, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 21:39:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:28 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) socket$inet_dccp(0x2, 0x6, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 21:39:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4004ae99, &(0x7f0000000380)={0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) 21:39:28 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1274.329969][T14164] tipc: TX() has been purged, node left! 21:39:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:39:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:29 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:29 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r0, &(0x7f0000000140)={{0x2, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x46) 21:39:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 21:39:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:39:29 executing program 3: 21:39:29 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:29 executing program 3: 21:39:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 21:39:30 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 21:39:30 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1276.139262][T14164] device bridge_slave_1 left promiscuous mode [ 1276.161067][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1276.206454][T14164] device bridge_slave_0 left promiscuous mode [ 1276.213869][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1276.292406][T14164] device veth1_vlan left promiscuous mode [ 1276.306181][T14164] device veth0_vlan left promiscuous mode [ 1277.736467][T14164] device hsr_slave_0 left promiscuous mode [ 1277.785930][T14164] device hsr_slave_1 left promiscuous mode [ 1277.832402][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1277.843645][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1277.853604][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1277.901794][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1277.979397][T14164] bond0 (unregistering): Released all slaves [ 1278.063810][T20428] IPVS: ftp: loaded support on port[0] = 21 [ 1278.115297][T20428] chnl_net:caif_netlink_parms(): no params data found [ 1278.148994][T20428] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.158631][T20428] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.166539][T20428] device bridge_slave_0 entered promiscuous mode [ 1278.174238][T20428] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.183522][T20428] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.191472][T20428] device bridge_slave_1 entered promiscuous mode [ 1278.247779][T20428] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1278.279730][T20428] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1278.321520][T20428] team0: Port device team_slave_0 added [ 1278.337121][T20428] team0: Port device team_slave_1 added [ 1278.421499][T20428] device hsr_slave_0 entered promiscuous mode [ 1278.479153][T20428] device hsr_slave_1 entered promiscuous mode [ 1278.525766][T20428] debugfs: Directory 'hsr0' with parent '/' already present! [ 1278.539968][T20431] IPVS: ftp: loaded support on port[0] = 21 [ 1278.599194][T20428] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.606274][T20428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1278.613579][T20428] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.620664][T20428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1278.722670][T20431] chnl_net:caif_netlink_parms(): no params data found [ 1278.744442][T20428] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1278.779470][T20431] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.786625][T20431] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.794320][T20431] device bridge_slave_0 entered promiscuous mode [ 1278.803369][T20431] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.810484][T20431] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.819023][T20431] device bridge_slave_1 entered promiscuous mode [ 1278.837444][T20431] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1278.848390][T20431] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1278.873081][T20431] team0: Port device team_slave_0 added [ 1278.879516][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1278.890704][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.898736][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.911924][T20428] 8021q: adding VLAN 0 to HW filter on device team0 [ 1278.919930][T20431] team0: Port device team_slave_1 added [ 1278.934170][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1278.943148][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.950252][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1279.018738][T20431] device hsr_slave_0 entered promiscuous mode [ 1279.066316][T14164] tipc: TX() has been purged, node left! [ 1279.066323][T20431] device hsr_slave_1 entered promiscuous mode [ 1279.125809][T20431] debugfs: Directory 'hsr0' with parent '/' already present! [ 1279.187520][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1279.196226][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1279.203303][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1279.215861][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1279.266512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1279.275361][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1279.284074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1279.293000][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1279.301586][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1279.310195][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1279.351494][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1279.360313][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1279.376424][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1279.384951][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1279.397749][T20428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1279.443157][T20428] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1279.453643][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1279.461544][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1279.518840][T20431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1279.530436][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1279.539084][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1279.575984][T20431] 8021q: adding VLAN 0 to HW filter on device team0 [ 1279.591344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1279.600241][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1279.636282][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1279.645051][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1279.653866][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 1279.660992][ T7941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1279.669798][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1279.688139][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1279.696763][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1279.705086][T13350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1279.712233][T13350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1279.720521][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1279.761152][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1279.769720][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1279.778325][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1279.787298][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1279.795099][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1279.805014][T20428] device veth0_vlan entered promiscuous mode [ 1279.843751][T20428] device veth1_vlan entered promiscuous mode [ 1279.850505][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1279.859124][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1279.868061][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1279.881169][T14164] device bridge_slave_1 left promiscuous mode [ 1279.887389][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1279.926580][T14164] device bridge_slave_0 left promiscuous mode [ 1279.932767][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1279.989262][T14164] device veth1_vlan left promiscuous mode [ 1279.995113][T14164] device veth0_vlan left promiscuous mode [ 1280.866098][T14164] device hsr_slave_0 left promiscuous mode [ 1280.906003][T14164] device hsr_slave_1 left promiscuous mode [ 1280.952858][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1280.963136][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1280.973096][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1281.010026][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1281.070935][T14164] bond0 (unregistering): Released all slaves [ 1281.172881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1281.181200][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1281.189735][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1281.204817][T20431] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1281.215590][T20431] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1281.236196][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1281.244697][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1281.253401][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1281.262811][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1281.283661][T20431] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1281.291061][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1281.302204][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1281.316087][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1281.417899][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1281.429897][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1281.451958][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 21:39:35 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1281.460903][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1281.474418][T20431] device veth0_vlan entered promiscuous mode [ 1281.481771][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1281.493164][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1281.513295][T20431] device veth1_vlan entered promiscuous mode 21:39:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:36 executing program 3: 21:39:36 executing program 1: 21:39:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:36 executing program 2: 21:39:36 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:36 executing program 1: 21:39:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4138ae84, &(0x7f0000000380)={0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) 21:39:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000200)=""/153) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 21:39:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b014"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:36 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000240), 0x4000000000dc) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1282.565886][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1282.574043][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:39:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC=r5, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:37 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 21:39:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4138ae84, &(0x7f0000000380)={0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) [ 1282.669881][T20482] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 21:39:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC=r5, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:37 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "4e96e1", 0x8, 0x4, 0x0, @empty, @local, {[], @echo_request}}}}}, 0x0) 21:39:37 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}) 21:39:37 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000000c0)='./bus/file0\x00') r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) 21:39:37 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127baae09a26c08d0153bd5a49d6748f6c07d75cc2e", 0xa1, r0) r2 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000003c0)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\xcc\xff%\xd2cTH,\x00'}}) [ 1283.375314][T20521] overlayfs: filesystem on './bus' not supported as upperdir [ 1283.665800][T14164] tipc: TX() has been purged, node left! [ 1283.815897][T14164] tipc: TX() has been purged, node left! [ 1284.962428][T20534] IPVS: ftp: loaded support on port[0] = 21 [ 1285.021915][T14164] device bridge_slave_1 left promiscuous mode [ 1285.028210][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1285.066423][T14164] device bridge_slave_0 left promiscuous mode [ 1285.072612][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1285.128950][T14164] device bridge_slave_1 left promiscuous mode [ 1285.135080][T14164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1285.166437][T14164] device bridge_slave_0 left promiscuous mode [ 1285.172836][T14164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1285.230325][T14164] device veth1_vlan left promiscuous mode [ 1285.236484][T14164] device veth0_vlan left promiscuous mode [ 1285.242382][T14164] device veth1_vlan left promiscuous mode [ 1285.248130][T14164] device veth0_vlan left promiscuous mode [ 1286.926061][T14164] device hsr_slave_0 left promiscuous mode [ 1286.965838][T14164] device hsr_slave_1 left promiscuous mode [ 1287.031617][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1287.042525][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1287.052575][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1287.108871][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1287.208609][T14164] bond0 (unregistering): Released all slaves [ 1287.416100][T14164] device hsr_slave_0 left promiscuous mode [ 1287.478508][T14164] device hsr_slave_1 left promiscuous mode [ 1287.523339][T14164] team0 (unregistering): Port device team_slave_1 removed [ 1287.533740][T14164] team0 (unregistering): Port device team_slave_0 removed [ 1287.543608][T14164] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1287.588976][T14164] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1287.667166][T14164] bond0 (unregistering): Released all slaves [ 1287.783338][T20534] chnl_net:caif_netlink_parms(): no params data found [ 1287.803052][T20537] IPVS: ftp: loaded support on port[0] = 21 [ 1287.818942][T20534] bridge0: port 1(bridge_slave_0) entered blocking state [ 1287.826062][T20534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.833711][T20534] device bridge_slave_0 entered promiscuous mode [ 1287.843398][T20534] bridge0: port 2(bridge_slave_1) entered blocking state [ 1287.850527][T20534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1287.858381][T20534] device bridge_slave_1 entered promiscuous mode [ 1287.878334][T20534] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1287.889474][T20534] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1287.916124][T20534] team0: Port device team_slave_0 added [ 1287.924119][T20534] team0: Port device team_slave_1 added [ 1288.008202][T20534] device hsr_slave_0 entered promiscuous mode [ 1288.066237][T20534] device hsr_slave_1 entered promiscuous mode [ 1288.105772][T20534] debugfs: Directory 'hsr0' with parent '/' already present! [ 1288.156291][T20537] chnl_net:caif_netlink_parms(): no params data found [ 1288.165355][T20534] bridge0: port 2(bridge_slave_1) entered blocking state [ 1288.172427][T20534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1288.179769][T20534] bridge0: port 1(bridge_slave_0) entered blocking state [ 1288.186810][T20534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1288.332336][T20534] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1288.343446][T20537] bridge0: port 1(bridge_slave_0) entered blocking state [ 1288.351044][T20537] bridge0: port 1(bridge_slave_0) entered disabled state [ 1288.359329][T20537] device bridge_slave_0 entered promiscuous mode [ 1288.367358][T20537] bridge0: port 2(bridge_slave_1) entered blocking state [ 1288.374423][T20537] bridge0: port 2(bridge_slave_1) entered disabled state [ 1288.383124][T20537] device bridge_slave_1 entered promiscuous mode [ 1288.412836][T20537] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1288.428806][T20534] 8021q: adding VLAN 0 to HW filter on device team0 [ 1288.449987][T20537] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1288.459199][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1288.477237][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1288.486857][T13350] bridge0: port 2(bridge_slave_1) entered disabled state [ 1288.499042][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1288.522917][T20537] team0: Port device team_slave_0 added [ 1288.549789][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1288.561824][T13350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1288.568922][T13350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1288.581079][T20537] team0: Port device team_slave_1 added [ 1288.678040][T20537] device hsr_slave_0 entered promiscuous mode [ 1288.728944][T20537] device hsr_slave_1 entered promiscuous mode [ 1288.815809][T20537] debugfs: Directory 'hsr0' with parent '/' already present! [ 1288.835704][T20534] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1288.847280][T20534] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1288.861536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1288.870433][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1288.879080][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1288.888015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1288.896539][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1288.904654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1288.933918][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1288.945126][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1288.960159][T20534] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1289.009536][T20537] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1289.021925][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1289.030656][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1289.041061][T20537] 8021q: adding VLAN 0 to HW filter on device team0 [ 1289.055660][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1289.064809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1289.073806][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1289.080908][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1289.116049][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1289.124006][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1289.133040][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1289.141743][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1289.148787][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1289.156904][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1289.165933][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1289.174517][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1289.182740][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1289.191249][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1289.200478][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1289.209297][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1289.218381][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1289.227143][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1289.235585][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1289.244454][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1289.252782][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1289.261475][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1289.269878][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1289.278227][T20534] device veth0_vlan entered promiscuous mode [ 1289.285080][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1289.292994][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1289.300828][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1289.312048][T20537] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1289.322551][T20534] device veth1_vlan entered promiscuous mode [ 1289.342120][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1289.350635][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1289.359348][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1289.367601][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1289.378308][T20537] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1289.476495][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1289.498639][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1289.511350][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1289.519251][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 21:39:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b014"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:43 executing program 1: syz_genetlink_get_family_id$tipc2(&(0x7f0000000b00)='TIPCv2\x00') 21:39:43 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000000c0)='./bus/file0\x00') r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r0) 21:39:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600)="08000000000000003759540d01ab3409d020ce89f347f85954148506ada508304f9a72c09ed607aaa5aebe2498570ca5d2d11eadfec8ef98f956a77dd104439715fb62f2aa8e3d83b831c272c31f4412f90df7203dd222f0652c485463d225ffcc2357e053c0ba88cdce1e394b0c4896e5ee5b1de0dd94615ce05f1eec2510cf313e048bdfc66a909be38e1127baae09a26c08d0153bd5a49d6748f6c07d75cc2e", 0xa1, r0) r2 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000003c0)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r1}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\xcc\xff%\xd2cTH,\x00'}}) 21:39:43 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1289.532064][T20537] device veth0_vlan entered promiscuous mode [ 1289.542849][T20537] device veth1_vlan entered promiscuous mode 21:39:44 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1290.075964][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1290.075971][T20563] mkiss: ax0: crc mode is auto. [ 1290.102964][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1290.162698][T20573] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1290.170187][ T8186] tipc: TX() has been purged, node left! 21:39:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC=r5, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:44 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0x4143, &(0x7f0000000500)) 21:39:44 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000180)=@chain={'key_or_keyring:', r1, ':chain\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='/\\GPL#vboxnet0posix_acl_access-@\x00') openat$cachefiles(0xffffffffffffff9c, 0x0, 0x7acaea4268bc1662, 0x0) dup(0xffffffffffffffff) 21:39:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b014"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:44 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 21:39:45 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 21:39:45 executing program 3: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 21:39:45 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:45 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:45 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1291.533006][T20602] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 21:39:46 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 21:39:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:46 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:46 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1291.936222][T20607] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 21:39:46 executing program 3: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1293.057910][ T8186] device bridge_slave_1 left promiscuous mode [ 1293.064211][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1293.136349][ T8186] device bridge_slave_0 left promiscuous mode [ 1293.142606][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1293.188942][ T8186] device veth1_vlan left promiscuous mode [ 1293.194694][ T8186] device veth0_vlan left promiscuous mode [ 1294.096193][ T8186] device hsr_slave_0 left promiscuous mode [ 1294.149094][ T8186] device hsr_slave_1 left promiscuous mode [ 1294.195980][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1294.207204][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1294.217429][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1294.279530][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1294.349791][ T8186] bond0 (unregistering): Released all slaves [ 1294.454874][T20634] IPVS: ftp: loaded support on port[0] = 21 [ 1294.455154][T20636] IPVS: ftp: loaded support on port[0] = 21 [ 1294.545050][T20634] chnl_net:caif_netlink_parms(): no params data found [ 1294.633433][T20634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1294.643920][T20634] bridge0: port 1(bridge_slave_0) entered disabled state [ 1294.652186][T20634] device bridge_slave_0 entered promiscuous mode [ 1294.672414][T20634] bridge0: port 2(bridge_slave_1) entered blocking state [ 1294.682439][T20634] bridge0: port 2(bridge_slave_1) entered disabled state [ 1294.690584][T20634] device bridge_slave_1 entered promiscuous mode [ 1294.702458][T20636] chnl_net:caif_netlink_parms(): no params data found [ 1294.737725][T20634] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1294.764205][T20634] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1294.778374][T20636] bridge0: port 1(bridge_slave_0) entered blocking state [ 1294.785456][T20636] bridge0: port 1(bridge_slave_0) entered disabled state [ 1294.797029][T20636] device bridge_slave_0 entered promiscuous mode [ 1294.815447][T20634] team0: Port device team_slave_0 added [ 1294.825349][T20636] bridge0: port 2(bridge_slave_1) entered blocking state [ 1294.833101][T20636] bridge0: port 2(bridge_slave_1) entered disabled state [ 1294.844918][T20636] device bridge_slave_1 entered promiscuous mode [ 1294.853020][T20634] team0: Port device team_slave_1 added [ 1294.889655][T20636] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1294.938494][T20634] device hsr_slave_0 entered promiscuous mode [ 1295.006116][T20634] device hsr_slave_1 entered promiscuous mode [ 1295.045797][T20634] debugfs: Directory 'hsr0' with parent '/' already present! [ 1295.054585][T20636] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1295.102216][T20636] team0: Port device team_slave_0 added [ 1295.109445][T20636] team0: Port device team_slave_1 added [ 1295.169096][T20636] device hsr_slave_0 entered promiscuous mode [ 1295.196198][T20636] device hsr_slave_1 entered promiscuous mode [ 1295.235826][T20636] debugfs: Directory 'hsr0' with parent '/' already present! [ 1295.243928][T20634] bridge0: port 2(bridge_slave_1) entered blocking state [ 1295.250984][T20634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1295.258351][T20634] bridge0: port 1(bridge_slave_0) entered blocking state [ 1295.265411][T20634] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1295.307112][T20636] bridge0: port 2(bridge_slave_1) entered blocking state [ 1295.314168][T20636] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1295.321466][T20636] bridge0: port 1(bridge_slave_0) entered blocking state [ 1295.328500][T20636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1295.366851][T20634] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1295.384501][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1295.393167][T13350] bridge0: port 1(bridge_slave_0) entered disabled state [ 1295.401251][T13350] bridge0: port 2(bridge_slave_1) entered disabled state [ 1295.410910][T13350] bridge0: port 1(bridge_slave_0) entered disabled state [ 1295.418979][T13350] bridge0: port 2(bridge_slave_1) entered disabled state [ 1295.433610][T20634] 8021q: adding VLAN 0 to HW filter on device team0 [ 1295.451120][T20636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1295.468951][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1295.477640][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1295.486038][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1295.493143][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1295.501314][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1295.509965][ T8186] tipc: TX() has been purged, node left! [ 1295.510155][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1295.524187][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1295.524193][ T8186] tipc: TX() has been purged, node left! [ 1295.536941][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1295.544770][ T8186] tipc: TX() has been purged, node left! [ 1295.554581][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1295.562876][ T8186] tipc: TX() has been purged, node left! [ 1295.564009][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1295.578466][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1295.587607][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1295.596432][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1295.604114][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1295.611903][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1295.620542][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1295.630951][T20636] 8021q: adding VLAN 0 to HW filter on device team0 [ 1295.640950][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1295.652558][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1295.661408][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1295.670039][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1295.677085][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1295.689208][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1295.697803][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1295.710692][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1295.719504][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1295.728206][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1295.735288][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1295.743524][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1295.751937][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1295.762666][T20634] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1295.776598][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1295.788772][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1295.797791][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1295.806604][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1295.815553][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1296.019125][T20636] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1296.029538][T20636] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1296.041250][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1296.050137][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1296.059058][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1296.067523][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1296.076344][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1296.083895][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1296.091575][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1296.099855][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1296.108069][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1296.125051][T20636] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1296.233498][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1296.241023][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1296.249799][T20634] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1296.396059][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1296.404619][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1296.417460][T20636] device veth0_vlan entered promiscuous mode [ 1296.429039][T20636] device veth1_vlan entered promiscuous mode [ 1296.435682][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1296.444556][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1296.453437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1296.461937][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1296.470086][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1296.575948][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1296.584670][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1296.605479][T20634] device veth0_vlan entered promiscuous mode [ 1296.616785][T20634] device veth1_vlan entered promiscuous mode [ 1296.749238][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1296.759263][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1296.769267][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1296.785226][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1296.798277][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1296.807034][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:39:51 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:51 executing program 2: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 21:39:51 executing program 3: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="0200000000008ff93961a05fe2b00cf5d2fcddfd1a00009038d00d5873ea94b080374007242f79399a169a7715919be87aeaa6f8a2a4f2dd7b72851847871015d6c882d0316ede12e8bf0e36f56f6a85f565c55a00d2d3bdcac52f68e1dc6591ed99038eeb64128991db28"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r1) shutdown(r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window={0x3, 0x0, 0xfffe}, @mss={0x2, 0x3}], 0x6dd9207777e1701) sendmmsg(r2, &(0x7f0000004b40), 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="160e90cb39bca59f8c40649e3eb79d8745797b308edd84adef35ad9d8a17240f38f5a8f8c55f3875db81d255eea402e1c11ca7fc01964aeb9ed6ef4e80bc67cba7e7fe961fe5d921442b0a06b135f8a73b68486ba1a76f256f50ae7cb980e69e7580b9f11c6ede4210f23240559b8c428900d7ce7862417ab5a50e494b2a54e346d7efa008ccef06813e235b446788ac0f1df3c65bc1fb5393364a2efd284640ec2c438ad2b24a69f1f9da000000000004000000000000009eee6a9283bf253ca4"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 1297.177631][T20653] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 21:39:51 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:51 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6081800ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000, 0x0, 0x4]}}, r2}}, 0x48) 21:39:52 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:52 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:39:52 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:39:52 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0x40044145, 0x0) [ 1298.788394][ T8186] device bridge_slave_1 left promiscuous mode [ 1298.794666][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1298.856986][ T8186] device bridge_slave_0 left promiscuous mode [ 1298.869270][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1298.942512][ T8186] device bridge_slave_1 left promiscuous mode [ 1298.959067][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1299.016583][ T8186] device bridge_slave_0 left promiscuous mode [ 1299.026901][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.088739][ T8186] device bridge_slave_1 left promiscuous mode [ 1299.094879][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1299.146530][ T8186] device bridge_slave_0 left promiscuous mode [ 1299.152767][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.208765][ T8186] device bridge_slave_1 left promiscuous mode [ 1299.214973][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1299.246443][ T8186] device bridge_slave_0 left promiscuous mode [ 1299.252607][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.313381][ T8186] device veth1_vlan left promiscuous mode [ 1299.319197][ T8186] device veth0_vlan left promiscuous mode [ 1299.325115][ T8186] device veth1_vlan left promiscuous mode [ 1299.330883][ T8186] device veth0_vlan left promiscuous mode [ 1299.337276][ T8186] device veth1_vlan left promiscuous mode [ 1299.343007][ T8186] device veth0_vlan left promiscuous mode [ 1299.349033][ T8186] device veth1_vlan left promiscuous mode [ 1299.354909][ T8186] device veth0_vlan left promiscuous mode [ 1302.626122][ T8186] device hsr_slave_0 left promiscuous mode [ 1302.665882][ T8186] device hsr_slave_1 left promiscuous mode [ 1302.732605][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1302.742990][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1302.753228][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1302.779228][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1302.848777][ T8186] bond0 (unregistering): Released all slaves [ 1303.086337][ T8186] device hsr_slave_0 left promiscuous mode [ 1303.145869][ T8186] device hsr_slave_1 left promiscuous mode [ 1303.212487][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1303.222842][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1303.233075][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1303.271575][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1303.338619][ T8186] bond0 (unregistering): Released all slaves [ 1303.566025][ T8186] device hsr_slave_0 left promiscuous mode [ 1303.605777][ T8186] device hsr_slave_1 left promiscuous mode [ 1303.662570][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1303.672690][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1303.683055][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1303.739832][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1303.798134][ T8186] bond0 (unregistering): Released all slaves [ 1304.006170][ T8186] device hsr_slave_0 left promiscuous mode [ 1304.045898][ T8186] device hsr_slave_1 left promiscuous mode [ 1304.093281][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1304.103533][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1304.113272][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1304.151542][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1304.209204][ T8186] bond0 (unregistering): Released all slaves [ 1304.329270][T20694] IPVS: ftp: loaded support on port[0] = 21 [ 1304.329513][T20698] IPVS: ftp: loaded support on port[0] = 21 [ 1304.349510][T20699] IPVS: ftp: loaded support on port[0] = 21 [ 1304.355239][T20700] IPVS: ftp: loaded support on port[0] = 21 [ 1304.483079][T20699] chnl_net:caif_netlink_parms(): no params data found [ 1304.504189][T20694] chnl_net:caif_netlink_parms(): no params data found [ 1304.567140][T20698] chnl_net:caif_netlink_parms(): no params data found [ 1304.613804][T20694] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.624478][T20694] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.632562][T20694] device bridge_slave_0 entered promiscuous mode [ 1304.660911][T20699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.668070][T20699] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.675881][T20699] device bridge_slave_0 entered promiscuous mode [ 1304.683292][T20698] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.690388][T20698] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.698362][T20698] device bridge_slave_0 entered promiscuous mode [ 1304.705344][T20694] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.712866][T20694] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.720662][T20694] device bridge_slave_1 entered promiscuous mode [ 1304.732874][T20699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.740031][T20699] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.747965][T20699] device bridge_slave_1 entered promiscuous mode [ 1304.754624][T20698] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.761782][T20698] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.769734][T20698] device bridge_slave_1 entered promiscuous mode [ 1304.792983][T20698] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1304.803706][T20698] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1304.825909][T20700] chnl_net:caif_netlink_parms(): no params data found [ 1304.840169][T20694] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1304.857957][T20694] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1304.869015][T20699] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1304.881625][T20698] team0: Port device team_slave_0 added [ 1304.895294][T20699] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1304.909453][T20698] team0: Port device team_slave_1 added [ 1304.924571][T20694] team0: Port device team_slave_0 added [ 1304.933591][T20694] team0: Port device team_slave_1 added [ 1304.948790][T20699] team0: Port device team_slave_0 added [ 1304.974202][T20699] team0: Port device team_slave_1 added [ 1304.989889][T20700] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.997091][T20700] bridge0: port 1(bridge_slave_0) entered disabled state [ 1305.004785][T20700] device bridge_slave_0 entered promiscuous mode [ 1305.048118][T20694] device hsr_slave_0 entered promiscuous mode [ 1305.106146][T20694] device hsr_slave_1 entered promiscuous mode [ 1305.218133][T20698] device hsr_slave_0 entered promiscuous mode [ 1305.266058][T20698] device hsr_slave_1 entered promiscuous mode [ 1305.325985][T20698] debugfs: Directory 'hsr0' with parent '/' already present! [ 1305.333573][T20700] bridge0: port 2(bridge_slave_1) entered blocking state [ 1305.341263][T20700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1305.351836][T20700] device bridge_slave_1 entered promiscuous mode [ 1305.398602][T20700] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1305.409191][T20700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1305.438185][T20699] device hsr_slave_0 entered promiscuous mode [ 1305.486107][T20699] device hsr_slave_1 entered promiscuous mode [ 1305.535802][T20699] debugfs: Directory 'hsr0' with parent '/' already present! [ 1305.548748][T20700] team0: Port device team_slave_0 added [ 1305.618167][T20700] team0: Port device team_slave_1 added [ 1305.868353][T20700] device hsr_slave_0 entered promiscuous mode [ 1305.906117][T20700] device hsr_slave_1 entered promiscuous mode [ 1305.955766][T20700] debugfs: Directory 'hsr0' with parent '/' already present! [ 1306.057648][T20698] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1306.091468][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1306.106149][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1306.114807][T20698] 8021q: adding VLAN 0 to HW filter on device team0 [ 1306.140734][T20694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1306.150413][T20699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1306.186691][T20694] 8021q: adding VLAN 0 to HW filter on device team0 [ 1306.193786][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1306.206513][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1306.215359][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 1306.222417][ T7941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1306.230844][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1306.239560][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1306.248070][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 1306.255078][ T7941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1306.262922][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1306.271948][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1306.280691][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1306.289253][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1306.297898][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1306.306486][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1306.315143][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1306.322985][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1306.331141][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1306.339347][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1306.355102][T20699] 8021q: adding VLAN 0 to HW filter on device team0 [ 1306.387213][T20700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1306.394265][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1306.417014][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1306.425496][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1306.434599][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1306.442400][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1306.450148][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1306.458495][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1306.466976][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1306.475596][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1306.484108][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 1306.491225][T13366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1306.499279][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1306.507999][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1306.516418][T13366] bridge0: port 2(bridge_slave_1) entered blocking state [ 1306.523436][T13366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1306.531311][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1306.540395][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1306.549515][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1306.558167][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1306.567015][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1306.575452][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1306.584919][T20698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1306.597993][T20694] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1306.608571][T20694] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1306.619901][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1306.628398][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1306.636914][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1306.645230][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1306.654158][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1306.662845][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1306.671702][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1306.688336][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1306.697984][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1306.706854][ T9300] bridge0: port 1(bridge_slave_0) entered blocking state [ 1306.713886][ T9300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1306.735171][T20694] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1306.749725][T20700] 8021q: adding VLAN 0 to HW filter on device team0 [ 1306.761202][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1306.771967][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1306.788228][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1306.801115][T13350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1306.808168][T13350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1306.816127][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1306.825078][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1306.834800][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1306.846160][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1306.853621][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1306.862520][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1306.871507][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1306.880134][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1306.888985][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1306.897853][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1306.906305][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1306.914019][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1306.922156][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1306.930230][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1306.942261][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1306.962341][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1306.971657][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1306.991498][ T9300] bridge0: port 1(bridge_slave_0) entered blocking state [ 1306.998578][ T9300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1307.013724][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1307.023205][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1307.036112][ T9300] bridge0: port 2(bridge_slave_1) entered blocking state [ 1307.043154][ T9300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1307.051459][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1307.061260][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1307.069575][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1307.078180][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1307.089042][T20698] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1307.101150][T20699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1307.117074][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1307.131244][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1307.140037][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1307.149075][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1307.157731][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1307.166995][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1307.184163][T20700] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1307.194841][T20700] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1307.208351][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1307.217235][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1307.227060][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1307.235561][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1307.244332][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1307.267839][T20699] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1307.276473][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1307.285251][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1307.294656][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1307.303149][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1307.328112][T20700] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1307.335581][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1307.349924][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1307.364413][T20694] device veth0_vlan entered promiscuous mode [ 1307.386472][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1307.395158][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1307.416597][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1307.424770][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1307.446916][T20698] device veth0_vlan entered promiscuous mode [ 1307.456720][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1307.464579][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1307.472675][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1307.481078][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1307.490381][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1307.498643][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1307.517181][T20698] device veth1_vlan entered promiscuous mode [ 1307.525638][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1307.539410][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1307.548442][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1307.578145][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1307.603214][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1307.618206][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1307.636146][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1307.645130][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1307.654814][T20694] device veth1_vlan entered promiscuous mode [ 1307.661603][ T8186] tipc: TX() has been purged, node left! [ 1307.667912][ T8186] tipc: TX() has been purged, node left! [ 1307.674585][T20699] device veth0_vlan entered promiscuous mode [ 1307.687717][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1307.696584][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1307.704468][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1307.713151][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1307.727880][T20700] device veth0_vlan entered promiscuous mode [ 1307.913664][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1307.921457][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1307.931932][T20699] device veth1_vlan entered promiscuous mode [ 1308.043599][T20700] device veth1_vlan entered promiscuous mode [ 1308.117057][T20734] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1308.203767][T20734] syz-executor.3 (20734) used greatest stack depth: 9752 bytes left 21:40:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:02 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1308.563163][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1308.582076][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1308.602676][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1308.640371][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1308.690329][T20741] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 21:40:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="2fcb"]) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x4000, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000000000)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:40:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:03 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='xfs\x00', 0x0, 0x0) [ 1308.790018][T20741] syz-executor.2 (20741) used greatest stack depth: 9704 bytes left 21:40:03 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:03 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:03 executing program 2: dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000240)=0x202, 0x4000000000dc) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:40:04 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:04 executing program 2: 21:40:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:04 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:04 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1310.178162][ T8186] device bridge_slave_1 left promiscuous mode [ 1310.184352][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1310.256320][ T8186] device bridge_slave_0 left promiscuous mode [ 1310.262529][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1310.332259][ T8186] device bridge_slave_1 left promiscuous mode [ 1310.348634][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1310.416635][ T8186] device bridge_slave_0 left promiscuous mode [ 1310.433079][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1310.500618][ T8186] device veth1_vlan left promiscuous mode [ 1310.516098][ T8186] device veth0_vlan left promiscuous mode [ 1310.535987][ T8186] device veth1_vlan left promiscuous mode [ 1310.541811][ T8186] device veth0_vlan left promiscuous mode [ 1312.516152][ T8186] device hsr_slave_0 left promiscuous mode [ 1312.555972][ T8186] device hsr_slave_1 left promiscuous mode [ 1312.603115][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1312.613746][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1312.624247][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1312.649603][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1312.730220][ T8186] bond0 (unregistering): Released all slaves [ 1312.936269][ T8186] device hsr_slave_0 left promiscuous mode [ 1312.975885][ T8186] device hsr_slave_1 left promiscuous mode [ 1313.024772][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1313.035120][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1313.045970][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1313.069335][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1313.129047][ T8186] bond0 (unregistering): Released all slaves [ 1313.250651][T20791] IPVS: ftp: loaded support on port[0] = 21 [ 1313.250810][T20789] IPVS: ftp: loaded support on port[0] = 21 [ 1313.262035][T20790] IPVS: ftp: loaded support on port[0] = 21 [ 1313.281449][T20784] IPVS: ftp: loaded support on port[0] = 21 [ 1313.299356][T20792] IPVS: ftp: loaded support on port[0] = 21 [ 1313.425039][T20789] chnl_net:caif_netlink_parms(): no params data found [ 1313.524893][T20789] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.532049][T20789] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.540619][T20789] device bridge_slave_0 entered promiscuous mode [ 1313.553807][T20789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.560876][T20789] bridge0: port 2(bridge_slave_1) entered disabled state [ 1313.568854][T20789] device bridge_slave_1 entered promiscuous mode [ 1313.606875][T20792] chnl_net:caif_netlink_parms(): no params data found [ 1313.633435][T20789] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1313.645651][T20790] chnl_net:caif_netlink_parms(): no params data found [ 1313.675229][T20789] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1313.684479][T20791] chnl_net:caif_netlink_parms(): no params data found [ 1313.845800][T20790] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.852912][T20790] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.865302][T20790] device bridge_slave_0 entered promiscuous mode [ 1313.887377][T20789] team0: Port device team_slave_0 added [ 1313.893070][T20792] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.905771][T20792] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.913666][T20792] device bridge_slave_0 entered promiscuous mode [ 1313.926011][T20784] chnl_net:caif_netlink_parms(): no params data found [ 1313.940269][T20790] bridge0: port 2(bridge_slave_1) entered blocking state [ 1313.952952][T20790] bridge0: port 2(bridge_slave_1) entered disabled state [ 1313.961455][T20790] device bridge_slave_1 entered promiscuous mode [ 1313.973315][T20789] team0: Port device team_slave_1 added [ 1313.979891][T20791] bridge0: port 1(bridge_slave_0) entered blocking state [ 1313.992009][T20791] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.999953][T20791] device bridge_slave_0 entered promiscuous mode [ 1314.011744][T20792] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.019085][T20792] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.031916][T20792] device bridge_slave_1 entered promiscuous mode [ 1314.052803][T20791] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.075773][T20791] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.083629][T20791] device bridge_slave_1 entered promiscuous mode [ 1314.138407][T20791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1314.153848][T20790] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1314.174261][T20791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1314.185319][T20792] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1314.196390][T20790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1314.238236][T20789] device hsr_slave_0 entered promiscuous mode [ 1314.276091][T20789] device hsr_slave_1 entered promiscuous mode [ 1314.315778][T20789] debugfs: Directory 'hsr0' with parent '/' already present! [ 1314.338284][T20792] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1314.367662][T20784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1314.374762][T20784] bridge0: port 1(bridge_slave_0) entered disabled state [ 1314.382820][T20784] device bridge_slave_0 entered promiscuous mode [ 1314.394615][T20784] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.401675][T20784] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.410088][T20784] device bridge_slave_1 entered promiscuous mode [ 1314.421719][T20790] team0: Port device team_slave_0 added [ 1314.428865][T20792] team0: Port device team_slave_0 added [ 1314.446044][T20791] team0: Port device team_slave_0 added [ 1314.465961][T20790] team0: Port device team_slave_1 added [ 1314.472312][T20792] team0: Port device team_slave_1 added [ 1314.479773][T20791] team0: Port device team_slave_1 added [ 1314.489485][T20784] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1314.524009][T20784] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1314.588023][T20790] device hsr_slave_0 entered promiscuous mode [ 1314.636184][T20790] device hsr_slave_1 entered promiscuous mode [ 1314.675814][T20790] debugfs: Directory 'hsr0' with parent '/' already present! [ 1314.695128][T20784] team0: Port device team_slave_0 added [ 1314.706402][T20784] team0: Port device team_slave_1 added [ 1314.778092][T20792] device hsr_slave_0 entered promiscuous mode [ 1314.826193][T20792] device hsr_slave_1 entered promiscuous mode [ 1314.895796][T20792] debugfs: Directory 'hsr0' with parent '/' already present! [ 1314.947843][T20791] device hsr_slave_0 entered promiscuous mode [ 1314.976175][T20791] device hsr_slave_1 entered promiscuous mode [ 1315.025822][T20791] debugfs: Directory 'hsr0' with parent '/' already present! [ 1315.088204][T20784] device hsr_slave_0 entered promiscuous mode [ 1315.146149][T20784] device hsr_slave_1 entered promiscuous mode [ 1315.185793][T20784] debugfs: Directory 'hsr0' with parent '/' already present! [ 1315.292623][ T8186] tipc: TX() has been purged, node left! [ 1315.298598][ T8186] tipc: TX() has been purged, node left! [ 1315.304440][ T8186] tipc: TX() has been purged, node left! [ 1315.315994][ T8186] tipc: TX() has been purged, node left! [ 1315.321976][T20789] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1315.363921][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1315.371820][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1315.381821][T20789] 8021q: adding VLAN 0 to HW filter on device team0 [ 1315.406952][T20790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1315.423965][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1315.432873][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1315.441351][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 1315.448621][T13366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1315.456844][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1315.667917][T20790] 8021q: adding VLAN 0 to HW filter on device team0 [ 1315.683967][T20792] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1315.693957][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1315.706868][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1315.714618][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1315.723487][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1315.732021][T13356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1315.739075][T13356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1315.747422][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1315.773446][T20791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1315.781388][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1315.794109][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1315.802945][T13350] bridge0: port 1(bridge_slave_0) entered blocking state [ 1315.809989][T13350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1315.822986][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1315.832007][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1315.840840][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1315.849347][T13350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1315.856476][T13350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1315.864405][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1315.873366][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1315.882264][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1315.891753][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1315.899793][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1315.926294][T20791] 8021q: adding VLAN 0 to HW filter on device team0 [ 1316.037253][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1316.046157][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1316.054791][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1316.063329][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1316.072065][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1316.081128][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1316.089929][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1316.098843][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1316.106833][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1316.114446][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1316.123199][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1316.133364][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1316.141893][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1316.151216][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1316.162666][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1316.170831][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1316.178724][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1316.187322][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1316.210855][T20784] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1316.222985][T20792] 8021q: adding VLAN 0 to HW filter on device team0 [ 1316.234170][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1316.243628][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1316.252447][T13350] bridge0: port 1(bridge_slave_0) entered blocking state [ 1316.259612][T13350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1316.267781][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1316.276887][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1316.285593][T13350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1316.292646][T13350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1316.300414][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1316.309759][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1316.318764][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1316.327674][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1316.336568][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1316.345130][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1316.354367][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1316.362662][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1316.471921][T20790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1316.483505][T20790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1316.497213][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1316.505467][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1316.514411][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1316.523690][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1316.532409][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1316.539514][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1316.547454][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1316.556534][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1316.564860][ T2880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1316.572227][ T2880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1316.580146][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1316.700829][T20784] 8021q: adding VLAN 0 to HW filter on device team0 [ 1316.714071][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1316.722805][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1316.731622][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1316.739489][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1316.747361][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1316.756580][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1316.765473][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1316.774102][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1316.783715][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1316.804804][T20790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1316.824943][T20792] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1316.836394][T20792] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1316.860140][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1316.867703][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1316.875112][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1316.888570][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1316.897128][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 1316.904164][T13366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1316.912073][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1316.920955][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1316.929383][T13366] bridge0: port 2(bridge_slave_1) entered blocking state [ 1316.936421][T13366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1316.944317][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1316.953231][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1316.961941][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1316.970240][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1316.979111][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1316.987651][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1316.996499][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1317.004930][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1317.013677][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1317.021971][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1317.136507][T20791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1317.151279][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1317.164023][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1317.173451][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1317.183212][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1317.191978][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1317.199510][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1317.215682][T20789] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1317.239499][T20792] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1317.364656][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1317.372714][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1317.381522][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1317.392358][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1317.400137][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1317.407913][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1317.417031][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1317.425702][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1317.434129][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1317.442930][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1317.450696][T13359] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1317.460066][T20784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1317.473076][T20791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1317.616850][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1317.625583][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1317.758544][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1317.771007][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1317.803132][T20790] device veth0_vlan entered promiscuous mode [ 1317.815811][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1317.824678][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1317.834539][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1317.843265][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1317.852239][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1317.860465][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1317.876559][T20784] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1317.890250][T20792] device veth0_vlan entered promiscuous mode [ 1317.903155][T20790] device veth1_vlan entered promiscuous mode [ 1318.008054][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1318.016928][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1318.025848][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1318.034573][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1318.043055][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1318.051802][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1318.061190][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1318.089157][ T8186] device bridge_slave_1 left promiscuous mode [ 1318.095396][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.118859][ T8186] device bridge_slave_0 left promiscuous mode [ 1318.125119][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.179028][ T8186] device bridge_slave_1 left promiscuous mode [ 1318.185268][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.236546][ T8186] device bridge_slave_0 left promiscuous mode [ 1318.242748][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.288659][ T8186] device bridge_slave_1 left promiscuous mode [ 1318.294881][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.336425][ T8186] device bridge_slave_0 left promiscuous mode [ 1318.342704][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.398511][ T8186] device bridge_slave_1 left promiscuous mode [ 1318.404692][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.466764][ T8186] device bridge_slave_0 left promiscuous mode [ 1318.472914][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.533855][ T8186] device veth1_vlan left promiscuous mode [ 1318.539862][ T8186] device veth0_vlan left promiscuous mode [ 1318.545648][ T8186] device veth1_vlan left promiscuous mode [ 1318.551565][ T8186] device veth0_vlan left promiscuous mode [ 1318.557548][ T8186] device veth1_vlan left promiscuous mode [ 1318.563290][ T8186] device veth0_vlan left promiscuous mode [ 1318.569562][ T8186] device veth1_vlan left promiscuous mode [ 1318.575400][ T8186] device veth0_vlan left promiscuous mode [ 1321.866075][ T8186] device hsr_slave_0 left promiscuous mode [ 1321.905902][ T8186] device hsr_slave_1 left promiscuous mode [ 1321.953552][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1321.964420][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1321.974926][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1322.030281][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1322.099401][ T8186] bond0 (unregistering): Released all slaves [ 1322.306214][ T8186] device hsr_slave_0 left promiscuous mode [ 1322.345883][ T8186] device hsr_slave_1 left promiscuous mode [ 1322.392175][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1322.402635][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1322.413215][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1322.470088][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1322.550103][ T8186] bond0 (unregistering): Released all slaves [ 1322.746163][ T8186] device hsr_slave_0 left promiscuous mode [ 1322.795826][ T8186] device hsr_slave_1 left promiscuous mode [ 1322.862204][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1322.872792][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1322.883280][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1322.929067][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1323.010238][ T8186] bond0 (unregistering): Released all slaves [ 1323.206094][ T8186] device hsr_slave_0 left promiscuous mode [ 1323.245806][ T8186] device hsr_slave_1 left promiscuous mode [ 1323.302981][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1323.313010][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1323.323226][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1323.348936][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1323.429256][ T8186] bond0 (unregistering): Released all slaves [ 1323.535887][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1323.544145][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1323.552809][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1323.561541][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1323.570956][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1323.579292][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1323.594469][T20789] device veth0_vlan entered promiscuous mode [ 1323.607146][T20792] device veth1_vlan entered promiscuous mode [ 1323.625248][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1323.637705][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1323.647357][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1323.656790][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1323.667460][T20791] device veth0_vlan entered promiscuous mode [ 1323.685438][T20789] device veth1_vlan entered promiscuous mode [ 1323.776035][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1323.792983][T13366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1323.838124][T20791] device veth1_vlan entered promiscuous mode [ 1323.888754][T20784] device veth0_vlan entered promiscuous mode [ 1323.914550][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1323.947042][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1323.974696][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1323.991908][ T9300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1324.001934][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1324.020514][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1324.046232][T20784] device veth1_vlan entered promiscuous mode [ 1324.193349][T20841] pit: kvm: requested 4190 ns i8254 timer period limited to 200000 ns [ 1324.220234][T20841] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 1324.325135][T20848] XFS (nullb0): Invalid superblock magic number 21:40:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:18 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:18 executing program 2: 21:40:18 executing program 3: 21:40:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1324.545826][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1324.563088][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:40:19 executing program 3: 21:40:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:19 executing program 2: 21:40:19 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:19 executing program 2: 21:40:19 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="02030609100000000000004c9e0000400200aa0802000000000000000000000105000600200000000a0000000000dfffff0400e50000070000001f000000000000250000000000000200010000010000000000020000627c05000500000000000a000000000000001700"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) [ 1326.745809][ T8186] tipc: TX() has been purged, node left! [ 1326.925899][ T8186] tipc: TX() has been purged, node left! [ 1326.964245][T20906] IPVS: ftp: loaded support on port[0] = 21 [ 1327.111754][T20906] chnl_net:caif_netlink_parms(): no params data found [ 1327.187690][T20906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1327.194788][T20906] bridge0: port 1(bridge_slave_0) entered disabled state [ 1327.202609][T20906] device bridge_slave_0 entered promiscuous mode [ 1327.210317][T20906] bridge0: port 2(bridge_slave_1) entered blocking state [ 1327.217463][T20906] bridge0: port 2(bridge_slave_1) entered disabled state [ 1327.225284][T20906] device bridge_slave_1 entered promiscuous mode [ 1327.289878][T20906] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1327.300952][T20906] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1327.369777][T20906] team0: Port device team_slave_0 added [ 1327.376869][T20906] team0: Port device team_slave_1 added [ 1327.427934][T20906] device hsr_slave_0 entered promiscuous mode [ 1327.466093][T20906] device hsr_slave_1 entered promiscuous mode [ 1327.575208][T20909] IPVS: ftp: loaded support on port[0] = 21 [ 1327.619408][T20906] bridge0: port 2(bridge_slave_1) entered blocking state [ 1327.626463][T20906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1327.633682][T20906] bridge0: port 1(bridge_slave_0) entered blocking state [ 1327.640725][T20906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1327.732090][T20909] chnl_net:caif_netlink_parms(): no params data found [ 1327.814104][T20909] bridge0: port 1(bridge_slave_0) entered blocking state [ 1327.821714][T20909] bridge0: port 1(bridge_slave_0) entered disabled state [ 1327.830256][T20909] device bridge_slave_0 entered promiscuous mode [ 1327.885444][T20909] bridge0: port 2(bridge_slave_1) entered blocking state [ 1327.892625][T20909] bridge0: port 2(bridge_slave_1) entered disabled state [ 1327.901232][T20909] device bridge_slave_1 entered promiscuous mode [ 1327.921231][T20909] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1327.982724][T20909] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1328.002662][T20909] team0: Port device team_slave_0 added [ 1328.009614][T20909] team0: Port device team_slave_1 added [ 1328.024908][T20906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1328.091453][T20909] device hsr_slave_0 entered promiscuous mode [ 1328.136378][T20909] device hsr_slave_1 entered promiscuous mode [ 1328.185809][T20909] debugfs: Directory 'hsr0' with parent '/' already present! [ 1328.193508][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1328.202054][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1328.210333][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1328.219345][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1328.235177][ T8186] device bridge_slave_1 left promiscuous mode [ 1328.241661][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1328.286299][ T8186] device bridge_slave_0 left promiscuous mode [ 1328.292539][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1328.358803][ T8186] device bridge_slave_1 left promiscuous mode [ 1328.365510][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1328.396683][ T8186] device bridge_slave_0 left promiscuous mode [ 1328.403409][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1328.469967][ T8186] device veth1_vlan left promiscuous mode [ 1328.479984][ T8186] device veth0_vlan left promiscuous mode [ 1328.486001][ T8186] device veth1_vlan left promiscuous mode [ 1328.491988][ T8186] device veth0_vlan left promiscuous mode [ 1330.146319][ T8186] device hsr_slave_0 left promiscuous mode [ 1330.185897][ T8186] device hsr_slave_1 left promiscuous mode [ 1330.241539][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1330.251754][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1330.262518][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1330.300563][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1330.358171][ T8186] bond0 (unregistering): Released all slaves [ 1330.586097][ T8186] device hsr_slave_0 left promiscuous mode [ 1330.625856][ T8186] device hsr_slave_1 left promiscuous mode [ 1330.682521][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1330.692853][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1330.704295][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1330.739909][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1330.809702][ T8186] bond0 (unregistering): Released all slaves [ 1330.900067][T20906] 8021q: adding VLAN 0 to HW filter on device team0 [ 1330.912906][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1330.921490][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1330.929815][T13354] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.936984][T13354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1330.945212][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1330.953813][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1330.962117][T13354] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.969150][T13354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1330.986307][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1330.995440][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1331.004853][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1331.013366][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1331.032647][T20906] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1331.043099][T20906] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1331.054684][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1331.062918][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1331.071570][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1331.080140][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1331.088594][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1331.097460][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1331.105861][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1331.114634][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1331.132634][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1331.140076][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1331.150936][T20906] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1331.304826][T20909] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1331.320290][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1331.335289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1331.351668][T20909] 8021q: adding VLAN 0 to HW filter on device team0 [ 1331.365046][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1331.373919][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1331.386196][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1331.393238][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1331.419449][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1331.427702][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1331.440520][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1331.449352][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1331.456425][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1331.467811][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1331.477598][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1331.488408][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1331.498707][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1331.515608][T20906] device veth0_vlan entered promiscuous mode [ 1331.537541][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1331.546408][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1331.554969][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1331.577795][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1331.590324][T20906] device veth1_vlan entered promiscuous mode [ 1331.603611][T20909] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1331.614930][T20909] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1331.627238][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1331.635066][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1331.643895][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1331.652659][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1331.661174][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1331.670050][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1331.679253][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1331.687989][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1331.696952][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1331.705274][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1331.725789][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1331.733939][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1331.742447][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1331.750237][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1331.760728][T20909] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1331.869625][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1331.882879][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1331.925365][T20904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1331.939583][T20904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1331.952599][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 21:40:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:26 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000000)="d2", 0x1) 21:40:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:26 executing program 3: socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmsg(r0, 0x0, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00'}) [ 1331.969682][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1331.979206][T20909] device veth0_vlan entered promiscuous mode [ 1332.002369][T20909] device veth1_vlan entered promiscuous mode 21:40:26 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$inet(r0, &(0x7f0000001240)={0x2, 0x0, @empty}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80) write$FUSE_DIRENTPLUS(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f3eb2b080000000000e0a984"], 0xc) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) [ 1332.194917][T20928] pit: kvm: requested 4190 ns i8254 timer period limited to 200000 ns [ 1332.236265][T20928] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 1332.579223][T20941] mkiss: ax0: crc mode is auto. 21:40:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:27 executing program 3: socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmsg(r0, 0x0, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x7) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00'}) 21:40:27 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:27 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0x80184132, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 21:40:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e200000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1332.859069][ T8186] tipc: TX() has been purged, node left! [ 1332.939952][T20973] pit: kvm: requested 4190 ns i8254 timer period limited to 200000 ns 21:40:27 executing program 2: mmap(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000ac0), 0x1000) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x42080}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x40, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x81}, 0x20000020) shmctl$SHM_STAT(0x0, 0xd, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}], 0x1, &(0x7f0000000300)={0x0, 0x1c9c380}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000800), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000840)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)={0x6}, 0x68) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0184908, &(0x7f0000000100)={0x0, 0x0, 0x1000}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) 21:40:27 executing program 3: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/82, 0x52}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="da060650b6b2381030aa65e315fc520d"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xfffffffffffffed5, 0x0, 0xffffffffffffffc7}, 0x0) 21:40:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:27 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1333.346417][T20991] IPVS: ftp: loaded support on port[0] = 21 [ 1333.511797][T20993] ion_ioctl: ioctl validate failed 21:40:28 executing program 2: mmap(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000ac0), 0x1000) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x42080}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x40, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x81}, 0x20000020) shmctl$SHM_STAT(0x0, 0xd, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}], 0x1, &(0x7f0000000300)={0x0, 0x1c9c380}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000800), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000840)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)={0x6}, 0x68) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0184908, &(0x7f0000000100)={0x0, 0x0, 0x1000}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) 21:40:28 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x11, 0x3, 0x0) setuid(0x0) ioprio_get$uid(0x3, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}]}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC=r5, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1334.087670][T20994] IPVS: ftp: loaded support on port[0] = 21 21:40:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x11, 0x3, 0x0) setuid(0x0) ioprio_get$uid(0x3, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}]}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC=r5, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:28 executing program 2: mmap(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000ac0), 0x1000) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x42080}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x40, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x81}, 0x20000020) shmctl$SHM_STAT(0x0, 0xd, 0x0) semtimedop(0x0, &(0x7f00000002c0)=[{}], 0x1, &(0x7f0000000300)={0x0, 0x1c9c380}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000800), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000840)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)={0x6}, 0x68) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0xc0184908, &(0x7f0000000100)={0x0, 0x0, 0x1000}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) 21:40:28 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1335.449616][ T8186] device bridge_slave_1 left promiscuous mode [ 1335.456987][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1335.506402][ T8186] device bridge_slave_0 left promiscuous mode [ 1335.513746][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1335.568993][ T8186] device veth1_vlan left promiscuous mode [ 1335.578255][ T8186] device veth0_vlan left promiscuous mode [ 1336.726339][ T8186] device hsr_slave_0 left promiscuous mode [ 1336.775864][ T8186] device hsr_slave_1 left promiscuous mode [ 1336.822461][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1336.833542][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1336.843927][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1336.879780][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1336.949990][ T8186] bond0 (unregistering): Released all slaves [ 1337.090798][T21046] IPVS: ftp: loaded support on port[0] = 21 [ 1337.157076][T21048] IPVS: ftp: loaded support on port[0] = 21 [ 1337.210849][T21046] chnl_net:caif_netlink_parms(): no params data found [ 1337.415311][T21046] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.435898][T21046] bridge0: port 1(bridge_slave_0) entered disabled state [ 1337.455875][T21046] device bridge_slave_0 entered promiscuous mode [ 1337.492578][T21048] chnl_net:caif_netlink_parms(): no params data found [ 1337.511275][T21046] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.525821][T21046] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.533769][T21046] device bridge_slave_1 entered promiscuous mode [ 1337.598786][T21046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1337.620999][T21048] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.645783][T21048] bridge0: port 1(bridge_slave_0) entered disabled state [ 1337.653984][T21048] device bridge_slave_0 entered promiscuous mode [ 1337.678758][T21046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1337.701171][T21048] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.729037][T21048] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.737695][T21048] device bridge_slave_1 entered promiscuous mode [ 1337.775893][T21046] team0: Port device team_slave_0 added [ 1337.796583][T21048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1337.806537][T21046] team0: Port device team_slave_1 added [ 1337.833990][T21048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1337.908299][T21046] device hsr_slave_0 entered promiscuous mode [ 1337.939612][T21046] device hsr_slave_1 entered promiscuous mode [ 1338.020744][T21048] team0: Port device team_slave_0 added [ 1338.028602][T21048] team0: Port device team_slave_1 added [ 1338.098362][T21048] device hsr_slave_0 entered promiscuous mode [ 1338.136511][T21048] device hsr_slave_1 entered promiscuous mode [ 1338.175872][T21048] debugfs: Directory 'hsr0' with parent '/' already present! [ 1338.277920][T21046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1338.318825][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1338.326892][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1338.339113][T21046] 8021q: adding VLAN 0 to HW filter on device team0 [ 1338.352915][T21048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1338.362662][T20904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1338.374798][T20904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1338.383782][T20904] bridge0: port 1(bridge_slave_0) entered blocking state [ 1338.390867][T20904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1338.400039][ T8186] tipc: TX() has been purged, node left! [ 1338.406523][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1338.414528][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1338.422633][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1338.468555][T21048] 8021q: adding VLAN 0 to HW filter on device team0 [ 1338.534927][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1338.543873][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1338.552477][ T2880] bridge0: port 2(bridge_slave_1) entered blocking state [ 1338.559949][ T2880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1338.568485][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1338.577341][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1338.586719][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1338.595532][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1338.604512][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1338.613389][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1338.622158][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1338.630858][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1338.643530][T21046] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1338.654799][T21046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1338.663676][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1338.672469][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1338.681779][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1338.690379][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1338.699506][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1338.708168][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1338.715474][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1338.723602][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1338.768102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1338.777888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1338.787968][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1338.795012][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1338.803027][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1338.841934][T21046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1338.849751][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1338.863519][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1338.882620][T21048] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1338.893497][T21048] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1338.905646][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1338.915486][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1338.924535][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1338.933901][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1338.943135][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1338.951901][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1338.960485][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1338.969560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1338.978242][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1339.025082][T21048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1339.032906][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1339.042000][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1339.050164][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1339.057928][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1339.107648][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1339.117298][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1339.130456][T21046] device veth0_vlan entered promiscuous mode [ 1339.170121][T20904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1339.179325][T20904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1339.191894][T21046] device veth1_vlan entered promiscuous mode [ 1339.200625][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1339.209426][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1339.217919][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1339.261029][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1339.270002][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1339.289119][T21048] device veth0_vlan entered promiscuous mode [ 1339.349617][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1339.361271][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1339.370681][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1339.378709][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1339.433358][T21048] device veth1_vlan entered promiscuous mode [ 1339.458318][ T8186] device bridge_slave_1 left promiscuous mode [ 1339.464496][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state 21:40:34 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/61, 0x69}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="815c6dc0ad79f411269d1ac3cacb70b4"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:40:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:34 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e200000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1339.525947][ T8186] device bridge_slave_0 left promiscuous mode [ 1339.559611][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state 21:40:34 executing program 3: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/82, 0x52}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="da060650b6b2381030aa65e315fc520d"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xfffffffffffffed5, 0x0, 0xffffffffffffffc7}, 0x0) [ 1339.631459][ T8186] device veth1_vlan left promiscuous mode [ 1339.648729][ T8186] device veth0_vlan left promiscuous mode [ 1339.662321][T21072] IPVS: ftp: loaded support on port[0] = 21 [ 1339.681316][T21076] IPVS: ftp: loaded support on port[0] = 21 [ 1339.820279][T21080] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 21:40:34 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:34 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x11, 0x3, 0x0) setuid(0x0) ioprio_get$uid(0x3, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}]}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC=r5, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1340.430594][T21079] IPVS: ftp: loaded support on port[0] = 21 21:40:34 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:35 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:35 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:35 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1341.239831][ T8186] device hsr_slave_0 left promiscuous mode [ 1341.293593][ T8186] device hsr_slave_1 left promiscuous mode [ 1341.327218][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1341.339398][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1341.351614][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1341.405022][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1341.485451][ T8186] bond0 (unregistering): Released all slaves [ 1341.685795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1341.694072][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:40:37 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/82, 0x52}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="c23a53ac000000009e8a0c4a7776af0d"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xfffffffffffffed5, 0x0, 0xffffffffffffffc7}, 0x0) 21:40:37 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e200000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:37 executing program 3: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffd6b}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="a863ab7458a2ac2f9ddee123e11308da"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xf8}, 0x0) [ 1343.385998][ T8186] tipc: TX() has been purged, node left! [ 1343.464275][T21144] IPVS: ftp: loaded support on port[0] = 21 [ 1343.530904][ T8186] tipc: TX() has been purged, node left! [ 1343.564144][T21150] IPVS: ftp: loaded support on port[0] = 21 21:40:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:38 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:38 executing program 3: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/61, 0x69}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x10000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="aaf8101b8ac483c40490f7a612fa33349998eda08cd5e1c4c542949a43c825ba"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 1343.986812][T21165] IPVS: ftp: loaded support on port[0] = 21 [ 1344.066930][T21168] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 21:40:38 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1344.348949][T21153] IPVS: ftp: loaded support on port[0] = 21 [ 1344.477945][T21181] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 21:40:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1344.945387][T21197] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 1345.918849][ T8186] device bridge_slave_1 left promiscuous mode [ 1345.926474][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1345.977580][ T8186] device bridge_slave_0 left promiscuous mode [ 1345.983806][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1346.049061][ T8186] device bridge_slave_1 left promiscuous mode [ 1346.055416][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1346.096369][ T8186] device bridge_slave_0 left promiscuous mode [ 1346.102602][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1346.171496][ T8186] device veth1_vlan left promiscuous mode [ 1346.180317][ T8186] device veth0_vlan left promiscuous mode [ 1346.186662][ T8186] device veth1_vlan left promiscuous mode [ 1346.192531][ T8186] device veth0_vlan left promiscuous mode [ 1347.926116][ T8186] device hsr_slave_0 left promiscuous mode [ 1347.986220][ T8186] device hsr_slave_1 left promiscuous mode [ 1348.041915][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1348.052537][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1348.064424][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1348.099071][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1348.177943][ T8186] bond0 (unregistering): Released all slaves [ 1348.426262][ T8186] device hsr_slave_0 left promiscuous mode [ 1348.475864][ T8186] device hsr_slave_1 left promiscuous mode [ 1348.522278][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1348.532725][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1348.543383][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1348.599663][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1348.678434][ T8186] bond0 (unregistering): Released all slaves [ 1348.784055][T21205] IPVS: ftp: loaded support on port[0] = 21 [ 1348.791378][T21207] IPVS: ftp: loaded support on port[0] = 21 [ 1348.869871][T21205] chnl_net:caif_netlink_parms(): no params data found [ 1348.905638][T21205] bridge0: port 1(bridge_slave_0) entered blocking state [ 1348.912756][T21205] bridge0: port 1(bridge_slave_0) entered disabled state [ 1348.920928][T21205] device bridge_slave_0 entered promiscuous mode [ 1348.930956][T21205] bridge0: port 2(bridge_slave_1) entered blocking state [ 1348.938381][T21205] bridge0: port 2(bridge_slave_1) entered disabled state [ 1348.946441][T21205] device bridge_slave_1 entered promiscuous mode [ 1348.969839][T21205] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1348.980581][T21205] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1348.999375][T21205] team0: Port device team_slave_0 added [ 1349.007892][T21205] team0: Port device team_slave_1 added [ 1349.087677][T21205] device hsr_slave_0 entered promiscuous mode [ 1349.136152][T21205] device hsr_slave_1 entered promiscuous mode [ 1349.185964][T21207] chnl_net:caif_netlink_parms(): no params data found [ 1349.337008][T21207] bridge0: port 1(bridge_slave_0) entered blocking state [ 1349.344096][T21207] bridge0: port 1(bridge_slave_0) entered disabled state [ 1349.352679][T21207] device bridge_slave_0 entered promiscuous mode [ 1349.366224][T21205] bridge0: port 2(bridge_slave_1) entered blocking state [ 1349.373658][T21205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1349.381031][T21205] bridge0: port 1(bridge_slave_0) entered blocking state [ 1349.388092][T21205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1349.398276][T21207] bridge0: port 2(bridge_slave_1) entered blocking state [ 1349.405441][T21207] bridge0: port 2(bridge_slave_1) entered disabled state 21:40:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x0, 0x0) 21:40:43 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:43 executing program 3: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/82, 0x52}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="62a7a3eb4bacf111c24d4f62f33bc5944eb683afd548d760d525564714ac31d2"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xfffffffffffffed5, 0x0, 0xffffffffffffffc7}, 0x0) [ 1349.436512][T21207] device bridge_slave_1 entered promiscuous mode [ 1349.491486][T21207] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1349.515859][T21213] IPVS: ftp: loaded support on port[0] = 21 [ 1349.532658][T21207] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1349.550789][T21205] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1349.574784][T21207] team0: Port device team_slave_0 added [ 1349.592459][T21205] 8021q: adding VLAN 0 to HW filter on device team0 [ 1349.606125][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1349.619166][T13354] bridge0: port 1(bridge_slave_0) entered disabled state [ 1349.640146][T13354] bridge0: port 2(bridge_slave_1) entered disabled state [ 1349.673227][T21207] team0: Port device team_slave_1 added [ 1349.706467][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1349.714998][T13354] bridge0: port 1(bridge_slave_0) entered blocking state [ 1349.722074][T13354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1349.750160][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1349.773629][T13354] bridge0: port 2(bridge_slave_1) entered blocking state [ 1349.780875][T13354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1349.836120][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1349.888198][T21207] device hsr_slave_0 entered promiscuous mode [ 1349.926162][T21207] device hsr_slave_1 entered promiscuous mode [ 1349.978830][T21207] debugfs: Directory 'hsr0' with parent '/' already present! [ 1349.989134][T21205] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1350.003096][T21205] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1350.014861][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1350.025698][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1350.034350][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1350.046284][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1350.054662][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1350.063214][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1350.071654][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1350.097685][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1350.131967][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1350.146058][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1350.157866][T21205] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1350.206601][T21207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1350.234208][T20904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1350.242543][T20904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1350.265756][T21207] 8021q: adding VLAN 0 to HW filter on device team0 [ 1350.276008][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1350.284853][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1350.296783][ T2880] bridge0: port 1(bridge_slave_0) entered blocking state [ 1350.303822][ T2880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1350.316855][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1350.324914][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1350.344476][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1350.364094][T13350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1350.371458][T13350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1350.389250][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1350.398178][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1350.407951][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1350.416635][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1350.425837][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1350.443128][T21207] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1350.453736][T21207] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1350.465647][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1350.474796][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1350.483467][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1350.491953][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1350.500492][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1350.509407][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1350.518141][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1350.526769][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1350.545474][T21205] device veth0_vlan entered promiscuous mode [ 1350.554464][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1350.562384][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1350.570890][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1350.579564][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1350.587547][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1350.601899][T21207] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1350.613809][T21205] device veth1_vlan entered promiscuous mode [ 1350.623943][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1350.633043][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1350.640589][ T2880] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1350.731245][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1350.742903][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1350.770121][T21207] device veth0_vlan entered promiscuous mode [ 1350.782213][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1350.812202][T21241] mkiss: ax0: crc mode is auto. [ 1350.814619][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1350.826847][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1350.839822][T21207] device veth1_vlan entered promiscuous mode [ 1350.848984][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 21:40:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:45 executing program 2: pipe(0x0) r0 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) memfd_create(0x0, 0x5) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="c6566ceda4e3ecc409e9515b62be01578cb34a00665921c0c26bc59a07847331f37bc07b686a97391b3c3df2ef75a5460fe26079bfc6bed87ef39b93afa4b89759e182bb107ffa78e41b96b94cffa77e35661af27c6864786f7d3c9ce1bd848e37731bec73480d03a3e71cec889ac1a19035a2b079d9b3ed", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r0, @ANYRESDEC], 0x7, 0x1) syz_open_dev$amidi(0x0, 0x9c4, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81003) 21:40:45 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000200)='/dev/cec#\x00', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x800000) sendfile(r0, r1, 0x0, 0x1ffe03) 21:40:45 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1351.115778][ T8186] tipc: TX() has been purged, node left! [ 1351.122104][ T8186] tipc: TX() has been purged, node left! [ 1351.136102][ T8186] tipc: TX() has been purged, node left! 21:40:45 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:46 executing program 3: setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:40:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 21:40:46 executing program 2: pipe(0x0) r0 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) memfd_create(0x0, 0x5) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="c6566ceda4e3ecc409e9515b62be01578cb34a00665921c0c26bc59a07847331f37bc07b686a97391b3c3df2ef75a5460fe26079bfc6bed87ef39b93afa4b89759e182bb107ffa78e41b96b94cffa77e35661af27c6864786f7d3c9ce1bd848e37731bec73480d03a3e71cec889ac1a19035a2b079d9b3ed", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r0, @ANYRESDEC], 0x7, 0x1) syz_open_dev$amidi(0x0, 0x9c4, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81003) 21:40:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1351.997541][T21292] pit: kvm: requested 4190 ns i8254 timer period limited to 200000 ns 21:40:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1352.215803][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1352.221595][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:40:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:46 executing program 3: pipe(0x0) r0 = getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) memfd_create(0x0, 0x5) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="c6566ceda4e3ecc409e9515b62be01578cb34a00665921c0c26bc59a07847331f37bc07b686a97391b3c3df2ef75a5460fe26079bfc6bed87ef39b93afa4b89759e182bb107ffa78e41b96b94cffa77e35661af27c6864786f7d3c9ce1bd848e37731bec73480d03a3e71cec889ac1a19035a2b079d9b3ed", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r0, @ANYRESDEC], 0x7, 0x1) syz_open_dev$amidi(0x0, 0x9c4, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)) syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81003) 21:40:46 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 21:40:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000012300)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) socket$kcm(0x2b, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xfffffff8, 0x0, 0x0, 0x282, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0xfffffffa}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000200)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x4}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x9, 0x10000}, &(0x7f0000000200)=0xfffffffffffffbff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r2, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) [ 1352.535907][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1352.541703][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:40:47 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 21:40:47 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "add088e814b8ceae63f1fe1723fa6a4c84bd32"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa10000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3b}], 0x3, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000440)='devlink\x00') ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000480)=0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x88, r4, 0x0, 0x70bd26, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0xfffffffffffffed5, 0x8b, r5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x88}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 21:40:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000700)='dctcp\x00', 0x6) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xfe43}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x3e8}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 21:40:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:47 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1355.145798][ T8186] tipc: TX() has been purged, node left! [ 1355.258360][T21374] IPVS: ftp: loaded support on port[0] = 21 [ 1355.308092][T21374] chnl_net:caif_netlink_parms(): no params data found [ 1355.316069][ T8186] tipc: TX() has been purged, node left! [ 1355.337975][T21374] bridge0: port 1(bridge_slave_0) entered blocking state [ 1355.345120][T21374] bridge0: port 1(bridge_slave_0) entered disabled state [ 1355.352975][T21374] device bridge_slave_0 entered promiscuous mode [ 1355.360685][T21374] bridge0: port 2(bridge_slave_1) entered blocking state [ 1355.367774][T21374] bridge0: port 2(bridge_slave_1) entered disabled state [ 1355.375496][T21374] device bridge_slave_1 entered promiscuous mode [ 1355.484435][T21374] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1355.495338][T21374] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1355.513447][T21374] team0: Port device team_slave_0 added [ 1355.520309][T21374] team0: Port device team_slave_1 added [ 1355.578086][T21374] device hsr_slave_0 entered promiscuous mode [ 1355.616118][T21374] device hsr_slave_1 entered promiscuous mode [ 1355.655990][T21374] debugfs: Directory 'hsr0' with parent '/' already present! [ 1355.728231][T21374] bridge0: port 2(bridge_slave_1) entered blocking state [ 1355.735309][T21374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1355.742621][T21374] bridge0: port 1(bridge_slave_0) entered blocking state [ 1355.749673][T21374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1355.857104][T21374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1355.862401][T21377] IPVS: ftp: loaded support on port[0] = 21 [ 1355.868621][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1355.877793][T13360] bridge0: port 1(bridge_slave_0) entered disabled state [ 1355.885960][T13360] bridge0: port 2(bridge_slave_1) entered disabled state [ 1355.894464][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1355.921137][T21374] 8021q: adding VLAN 0 to HW filter on device team0 [ 1355.987687][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1355.996342][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 1356.003370][ T7941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1356.011491][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1356.020082][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 1356.027146][ T7941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1356.111196][T21377] chnl_net:caif_netlink_parms(): no params data found [ 1356.190132][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1356.199041][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1356.217086][T21377] bridge0: port 1(bridge_slave_0) entered blocking state [ 1356.224167][T21377] bridge0: port 1(bridge_slave_0) entered disabled state [ 1356.232252][T21377] device bridge_slave_0 entered promiscuous mode [ 1356.295780][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1356.304285][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1356.316362][T21374] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1356.328047][T21374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1356.335710][T21377] bridge0: port 2(bridge_slave_1) entered blocking state [ 1356.342772][T21377] bridge0: port 2(bridge_slave_1) entered disabled state [ 1356.350958][T21377] device bridge_slave_1 entered promiscuous mode [ 1356.363595][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1356.434297][T21377] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1356.445239][T21377] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1356.519704][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1356.527342][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1356.535848][T21377] team0: Port device team_slave_0 added [ 1356.542786][T21377] team0: Port device team_slave_1 added [ 1356.552475][T21374] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1356.562771][ T8186] device bridge_slave_1 left promiscuous mode [ 1356.569305][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1356.626492][ T8186] device bridge_slave_0 left promiscuous mode [ 1356.632765][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1356.678350][ T8186] device bridge_slave_1 left promiscuous mode [ 1356.684487][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1356.726662][ T8186] device bridge_slave_0 left promiscuous mode [ 1356.732989][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1356.790931][ T8186] device veth1_vlan left promiscuous mode [ 1356.796797][ T8186] device veth0_vlan left promiscuous mode [ 1356.802594][ T8186] device veth1_vlan left promiscuous mode [ 1356.808366][ T8186] device veth0_vlan left promiscuous mode [ 1358.476100][ T8186] device hsr_slave_0 left promiscuous mode [ 1358.535927][ T8186] device hsr_slave_1 left promiscuous mode [ 1358.592887][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1358.603491][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1358.613656][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1358.659859][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1358.748983][ T8186] bond0 (unregistering): Released all slaves [ 1358.936072][ T8186] device hsr_slave_0 left promiscuous mode [ 1358.995931][ T8186] device hsr_slave_1 left promiscuous mode [ 1359.052273][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1359.062753][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1359.073137][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1359.099595][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1359.188495][ T8186] bond0 (unregistering): Released all slaves [ 1359.328363][T21377] device hsr_slave_0 entered promiscuous mode [ 1359.366114][T21377] device hsr_slave_1 entered promiscuous mode [ 1359.464395][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1359.473316][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1359.493342][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1359.501582][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1359.510866][T21374] device veth0_vlan entered promiscuous mode [ 1359.520500][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1359.528441][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1359.539059][T21374] device veth1_vlan entered promiscuous mode [ 1359.682129][T21377] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1359.697532][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1359.718638][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1359.739885][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1359.755968][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1359.766252][T21377] 8021q: adding VLAN 0 to HW filter on device team0 [ 1359.793657][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1359.802680][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1359.811570][T13360] bridge0: port 1(bridge_slave_0) entered blocking state [ 1359.818801][T13360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1359.866436][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1359.875110][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1359.923289][T13360] bridge0: port 2(bridge_slave_1) entered blocking state [ 1359.930372][T13360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1359.939298][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1359.948825][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1359.958502][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1359.967433][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1359.983445][T21377] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1359.994384][T21377] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1360.007750][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1360.016538][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1360.024780][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1360.034104][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1360.044508][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1360.053461][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1360.062830][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 21:40:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) [ 1360.079922][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1360.104554][T21377] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1360.123090][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1360.136889][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1360.144359][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1360.268521][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1360.302743][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1360.313074][T21377] device veth0_vlan entered promiscuous mode [ 1360.323380][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1360.331420][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1360.344753][T21377] device veth1_vlan entered promiscuous mode 21:40:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:55 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "add088e814b8ceae63f1fe1723fa6a4c84bd32"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa10000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3b}], 0x3, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000440)='devlink\x00') ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000480)=0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x88, r4, 0x0, 0x70bd26, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0xfffffffffffffed5, 0x8b, r5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x88}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) 21:40:55 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:55 executing program 2: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x800000, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r1) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket(0x80000000000000a, 0x3, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) 21:40:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000480)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:55 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46df00000000000000000000006551c02c19c5ff3c37719c47f44dcd0dd09c0f845d466914e7346a236afc1345d4e90db1dc1f79ad3ab976ae694d07c838251a24b156cdf7bd5adb838c599f6ec6551c1faf14058c840d4fd6a03ef707a79857fe7bc8d0e134afb699020e7bafd8ba88c545b3a3c454a46d5323554d1d0f5749a6d7493ad6655552fed59875ac28e33565a6e2c1e8489c77112733afc7cd481535cad6a63f9618b7c891ba020336"], 0xb1) recvmmsg(r1, &(0x7f0000000b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001580)=""/4092, 0xffffffb1}], 0x1, 0x0, 0x1d1}}], 0x274, 0x0, 0x0) 21:40:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:55 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:40:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1361.585882][ T8186] tipc: TX() has been purged, node left! [ 1361.650080][T21458] mkiss: ax0: crc mode is auto. [ 1361.689852][T21457] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 21:40:56 executing program 3: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="de", 0x1}], 0x1}, 0x0) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) 21:40:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000000)=0x8dc, 0x578) sendto$inet6(r1, 0x0, 0x0, 0x2000c004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 21:40:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 1361.947875][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:40:56 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1362.113606][T21479] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 21:40:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x11, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000700)=ANY=[@ANYBLOB="7f4570f79b7359fa8ceacd8b3147714710"], 0x11) recvmmsg(r2, &(0x7f0000000b80)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001580)=""/4092, 0xffffffb1}], 0x1, 0x0, 0x1d1}}], 0x274, 0x0, 0x0) 21:40:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:40:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:40:56 executing program 3: 21:40:57 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 1362.859158][T21514] mkiss: ax0: crc mode is auto. [ 1363.638373][ T8186] device bridge_slave_1 left promiscuous mode [ 1363.644681][ T8186] bridge0: port 2(bridge_slave_1) entered disabled state [ 1363.706557][ T8186] device bridge_slave_0 left promiscuous mode [ 1363.712766][ T8186] bridge0: port 1(bridge_slave_0) entered disabled state [ 1363.789207][ T8186] device veth1_vlan left promiscuous mode [ 1363.816231][ T8186] device veth0_vlan left promiscuous mode [ 1365.196086][ T8186] device hsr_slave_0 left promiscuous mode [ 1365.235925][ T8186] device hsr_slave_1 left promiscuous mode [ 1365.302253][ T8186] team0 (unregistering): Port device team_slave_1 removed [ 1365.312450][ T8186] team0 (unregistering): Port device team_slave_0 removed [ 1365.322239][ T8186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1365.379835][ T8186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1365.458768][ T8186] bond0 (unregistering): Released all slaves [ 1365.562951][T21541] IPVS: ftp: loaded support on port[0] = 21 [ 1365.613931][T21541] chnl_net:caif_netlink_parms(): no params data found [ 1365.641631][T21541] bridge0: port 1(bridge_slave_0) entered blocking state [ 1365.648961][T21541] bridge0: port 1(bridge_slave_0) entered disabled state [ 1365.657239][T21541] device bridge_slave_0 entered promiscuous mode [ 1365.664632][T21541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1365.671831][T21541] bridge0: port 2(bridge_slave_1) entered disabled state [ 1365.679644][T21541] device bridge_slave_1 entered promiscuous mode [ 1365.747382][T21541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1365.758384][T21541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1365.778614][T21541] team0: Port device team_slave_0 added [ 1365.785308][T21541] team0: Port device team_slave_1 added [ 1365.841512][T21541] device hsr_slave_0 entered promiscuous mode [ 1365.899110][T21541] device hsr_slave_1 entered promiscuous mode [ 1365.982250][T21541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1365.989378][T21541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1365.996652][T21541] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.003679][T21541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1366.044074][T21541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1366.060892][T13350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1366.072067][T13350] bridge0: port 1(bridge_slave_0) entered disabled state [ 1366.080701][T13350] bridge0: port 2(bridge_slave_1) entered disabled state [ 1366.097081][T21541] 8021q: adding VLAN 0 to HW filter on device team0 [ 1366.111088][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1366.119789][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.126963][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1366.148106][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1366.156804][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1366.163832][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1366.172587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1366.181422][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1366.194163][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1366.207718][T21541] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1366.218509][T21541] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1366.230666][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1366.239680][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1366.251078][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1366.277172][T21541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1366.285326][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1366.299547][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1366.357314][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1366.366714][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1366.375319][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1366.383055][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1366.392164][T21541] device veth0_vlan entered promiscuous mode [ 1366.401842][T21541] device veth1_vlan entered promiscuous mode [ 1366.571910][T21551] mkiss: ax0: crc mode is auto. [ 1366.577788][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1366.586330][ T7941] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 21:41:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:41:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:41:01 executing program 2: 21:41:01 executing program 3: 21:41:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:41:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r2 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r8, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:41:01 executing program 3: 21:41:01 executing program 2: 21:41:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:41:01 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:41:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:41:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:41:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:41:01 executing program 2: 21:41:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1367.659074][ T8181] tipc: TX() has been purged, node left! 21:41:02 executing program 3: 21:41:02 executing program 2: 21:41:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:41:02 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:41:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000440)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB=',euid>', @ANYRESDEC, @ANYRESDEC=r7, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r8, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r8, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:41:02 executing program 2: 21:41:02 executing program 3: 21:41:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:41:02 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r2 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) ioprio_get$uid(0x3, r3) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r3}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r6, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:41:03 executing program 2: 21:41:03 executing program 3: 21:41:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./bus\x00', 0x310000, 0x2b42969e38fbe390) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) r3 = socket(0x11, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) ioprio_get$uid(0x3, r4) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r4}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r7) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r7, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r9, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x5) 21:41:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xc8) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000040)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000400)={[{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000340)={[], 0x0, 0xffffffffffdce7bb}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 21:41:03 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, &(0x7f0000001280)={0x0, 0x0, "ad1eb7de70173150fc67eec52ec2c5d34a3dd6bb47b5d4620e9a247ae445c54d"}) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x2, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./bus\x00') r1 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioprio_get$uid(0x3, r2) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x2, 0x6cd}, {0x3, 0x8}], r2}, 0x18, 0x1) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r5) mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='bpf\x00', 0x244800, &(0x7f00000008c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303737372c870e00003d30303030303030313030303030303030303030303030362c6d6f64653d3030f14719355342814f30303030303030302ce1e5258ca8cc0f35a530303030332c6d6f64653d30303030303030303030303030303030303030303030342c6d6f64653d30303030303030303030303032303030303030303030312f7569643dcbf68d83763cfdd72185a954e52c10a91be50cf2d64a2353729bc54ed67c5f510220800c9ef179c9966f9c406d3f1411ff7456169d088521b3b2f03d068d93e67e764a55ef7ffca13fc05e9cae7c7fc0f8bf03a12e349bf98c6ce68b352ed64405176d68b1fdc56a2749a59b74fd692c5f8d46114f54f02fcd40c1680e9c94fa186f77cb24f50a5994968365b729835f934ee05591a876a62af74242a22ab1c31204d3", @ANYRESDEC=r3, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',obj_user=\\,uid<', @ANYRESDEC=r5, @ANYBLOB="00fc5b8fa415ca03bc888c3f5c0c98c57553eb9d2ab78dfb80db11fccf7e854aba5a31da60004ddaf4453d96496f45757d374f8637c82f9bf2ff7252eff9022a9a73b5c5a5d1b12df279231d5d066ff9d40d5cd0080423114e0cb34fb59a7b553e34f447955d0a3080d71259261ece4366d905b1fdfbd04cd11810b548ee98af1b5fc1f7c8c6ec1a40e176cc150bc3635b9a2a47fe7cc2f548151719530000000000000000f16efa1502d12d4a4c9a8a853402da5afaa48f5f6db0ebfa1bfd5007e4983db664c968d2c0586687c5296bd4ab32ea44004608e142b0145be296d12692ab87e20000000000"]) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x46000) io_setup(0x2346, &(0x7f0000000100)) ioctl$VIDIOC_G_SELECTION(r6, 0xc040565e, &(0x7f0000000080)={0x0, 0x0, 0x4, {0x2003b, 0x1ff, 0x7d, 0x1}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) 21:41:03 executing program 2: [ 1369.065141][T20792] ================================================================== [ 1369.073292][T20792] BUG: KCSAN: data-race in ns_capable_common / task_dump_owner [ 1369.081005][T20792] [ 1369.083342][T20792] read to 0xffff8880a531b024 of 4 bytes by task 21557 on cpu 1: [ 1369.090979][T20792] task_dump_owner+0x43/0x260 [ 1369.096526][T20792] pid_update_inode+0x3c/0x70 [ 1369.101203][T20792] pid_revalidate+0x91/0x120 [ 1369.105901][T20792] lookup_fast+0x6ac/0x6c0 [ 1369.110323][T20792] walk_component+0x6d/0xd90 [ 1369.114913][T20792] link_path_walk.part.0+0x5d3/0xa90 [ 1369.120197][T20792] path_openat+0x14f/0x3580 [ 1369.124702][T20792] do_filp_open+0x11e/0x1b0 [ 1369.129220][T20792] do_sys_open+0x3b3/0x4f0 [ 1369.133637][T20792] __x64_sys_open+0x55/0x70 [ 1369.138143][T20792] do_syscall_64+0xcc/0x3a0 [ 1369.142687][T20792] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1369.148562][T20792] [ 1369.150892][T20792] write to 0xffff8880a531b024 of 4 bytes by task 20792 on cpu 0: [ 1369.159224][T20792] ns_capable_common+0x9f/0xc0 [ 1369.163991][T20792] ns_capable+0x29/0x40 [ 1369.168215][T20792] do_ebt_get_ctl+0x61/0x440 [ 1369.172846][T20792] nf_getsockopt+0x71/0xb0 [ 1369.177332][T20792] ip_getsockopt+0x118/0x160 [ 1369.182010][T20792] tcp_getsockopt+0x7c/0xc0 [ 1369.186557][T20792] sock_common_getsockopt+0x67/0x90 [ 1369.191790][T20792] __sys_getsockopt+0xf1/0x210 [ 1369.196560][T20792] __x64_sys_getsockopt+0x70/0x90 [ 1369.201590][T20792] do_syscall_64+0xcc/0x3a0 [ 1369.206100][T20792] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1369.211976][T20792] [ 1369.214297][T20792] Reported by Kernel Concurrency Sanitizer on: [ 1369.220465][T20792] CPU: 0 PID: 20792 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1369.229146][T20792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.239201][T20792] ================================================================== [ 1369.247259][T20792] Kernel panic - not syncing: panic_on_warn set ... [ 1369.254378][T20792] CPU: 0 PID: 20792 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1369.263043][T20792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.273088][T20792] Call Trace: [ 1369.276461][T20792] dump_stack+0x11d/0x181 [ 1369.280799][T20792] panic+0x210/0x640 [ 1369.284699][T20792] ? vprintk_func+0x8d/0x140 [ 1369.289301][T20792] kcsan_report.cold+0xc/0xd [ 1369.293904][T20792] kcsan_setup_watchpoint+0x3fe/0x460 [ 1369.299292][T20792] __tsan_unaligned_write4+0xc7/0x110 [ 1369.304673][T20792] ns_capable_common+0x9f/0xc0 [ 1369.309450][T20792] ns_capable+0x29/0x40 [ 1369.313615][T20792] do_ebt_get_ctl+0x61/0x440 [ 1369.318220][T20792] ? try_module_get+0x2f/0x40 [ 1369.322910][T20792] ? mutex_unlock+0x41/0x50 [ 1369.327419][T20792] ? nf_sockopt_find.constprop.0+0x1a4/0x1c0 [ 1369.333405][T20792] nf_getsockopt+0x71/0xb0 [ 1369.337825][T20792] ip_getsockopt+0x118/0x160 [ 1369.342421][T20792] tcp_getsockopt+0x7c/0xc0 [ 1369.346936][T20792] sock_common_getsockopt+0x67/0x90 [ 1369.352144][T20792] __sys_getsockopt+0xf1/0x210 [ 1369.356927][T20792] __x64_sys_getsockopt+0x70/0x90 [ 1369.361966][T20792] do_syscall_64+0xcc/0x3a0 [ 1369.367005][T20792] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1369.372902][T20792] RIP: 0033:0x45da5a [ 1369.376805][T20792] Code: b8 34 01 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 8d 8b fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6a 8b fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1369.396417][T20792] RSP: 002b:00007fff00fa8518 EFLAGS: 00000202 ORIG_RAX: 0000000000000037 [ 1369.404833][T20792] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 000000000045da5a [ 1369.412830][T20792] RDX: 0000000000000081 RSI: 0000000000000000 RDI: 0000000000000003 [ 1369.420807][T20792] RBP: 00007fff00fa8530 R08: 00007fff00fa852c R09: 000000000000000a [ 1369.428781][T20792] R10: 00007fff00fa8530 R11: 0000000000000202 R12: 0000000000000003 [ 1369.436760][T20792] R13: 0000000000716e60 R14: 0000000000716de8 R15: 0000000000000d00 [ 1369.446338][T20792] Kernel Offset: disabled [ 1369.450667][T20792] Rebooting in 86400 seconds..