[ 98.885544][ T27] audit: type=1800 audit(1579703892.943:27): pid=9820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 98.927745][ T27] audit: type=1800 audit(1579703892.963:28): pid=9820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 99.996913][ T27] audit: type=1800 audit(1579703894.133:29): pid=9820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 100.017398][ T27] audit: type=1800 audit(1579703894.143:30): pid=9820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.22' (ECDSA) to the list of known hosts. 2020/01/22 14:38:21 fuzzer started 2020/01/22 14:38:24 dialing manager at 10.128.0.26:43793 2020/01/22 14:38:24 syscalls: 2699 2020/01/22 14:38:24 code coverage: enabled 2020/01/22 14:38:24 comparison tracing: enabled 2020/01/22 14:38:24 extra coverage: enabled 2020/01/22 14:38:24 setuid sandbox: enabled 2020/01/22 14:38:24 namespace sandbox: enabled 2020/01/22 14:38:24 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/22 14:38:24 fault injection: enabled 2020/01/22 14:38:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/22 14:38:24 net packet injection: enabled 2020/01/22 14:38:24 net device setup: enabled 2020/01/22 14:38:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/22 14:38:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 14:40:02 executing program 0: rt_sigpending(&(0x7f0000000000), 0x8) prctl$PR_SVE_SET_VL(0x32, 0x7238) r0 = socket$inet(0x2, 0x4, 0x40) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x800c00, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x901, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x120) r6 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x3, 0x210000) r7 = socket$rds(0x15, 0x5, 0x0) ppoll(&(0x7f00000001c0)=[{r0, 0xc0}, {r1, 0x1000}, {r2, 0x80}, {r3, 0x1010}, {r4, 0x182}, {r5, 0x1000}, {}, {r6}, {0xffffffffffffffff, 0x2000}, {r7, 0x602}], 0xa, &(0x7f0000000240), &(0x7f0000000280)={[0x1, 0x2]}, 0x8) r8 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x109000) signalfd(r8, &(0x7f0000000300)={[0x35ec, 0x7]}, 0x8) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r9, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7f}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040004}, 0x44) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r10, 0x300, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x1) ioctl$VIDIOC_ENUMOUTPUT(r8, 0xc0485630, &(0x7f00000005c0)={0x3b4, "6a138b5d3083e19663b6157c19e2ef1730b6d3167b4125a98d069ffc5b689e5f", 0x3, 0x2, 0xbe, 0x4000, 0x2}) r11 = openat$cgroup_ro(r6, &(0x7f0000000640)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r11, 0xc06055c8, &(0x7f0000000680)={0xc, 0x3f, {0x57, 0x2, 0x6, {0x2, 0x3}, {0x5}, @cond=[{0x81, 0x1, 0x5, 0x3, 0x636, 0x3}, {0x9, 0x100, 0xfff9, 0x800, 0x321b, 0x5}]}, {0x52, 0x8000, 0x1, {0x7ff, 0xd3}, {0xff, 0x9}, @cond=[{0x3, 0x4, 0x7, 0x5, 0x4, 0x7}, {0x1020, 0x1, 0x0, 0x8, 0x8, 0x2}]}}) r12 = socket$phonet(0x23, 0x2, 0x1) setsockopt$SO_TIMESTAMPING(r12, 0x1, 0x25, &(0x7f0000000700)=0x200, 0x4) r13 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000900)='/dev/btrfs-control\x00', 0x800, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r13, 0x10f, 0x84, &(0x7f0000000940), &(0x7f0000000980)=0x4) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) socket$vsock_stream(0x28, 0x1, 0x0) r14 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r15 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a80)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r14, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x2c, r15, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x6}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x890}, 0x0) r16 = syz_open_dev$mouse(&(0x7f0000000b80)='/dev/input/mouse#\x00', 0x2, 0x101340) ioctl$RNDCLEARPOOL(r16, 0x5206, &(0x7f0000000bc0)=0x101) 14:40:02 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x7fff, 0x80) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x1, [0x4, 0x1, 0xf3c5, 0x3, 0x9, 0x9, 0x8, 0xff08, 0x9, 0xd21f, 0x36, 0xff, 0x0, 0x8, 0x7, 0x57, 0x9, 0x1, 0x3, 0x7fff, 0x0, 0x1f, 0x3, 0x7b40, 0x2, 0x7, 0xffe1, 0x8, 0x0, 0x9, 0x4, 0x800, 0xd7b1, 0x2, 0x7, 0x1, 0x8, 0x1c0, 0x7, 0x9, 0x4, 0x7, 0x2, 0x2a, 0xfb5, 0x1, 0x5, 0x80], 0x5}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000100)="fc3c5ebff9f26b74316ffbb21404b46d048a5e424b8a64bbd427c8099fc1d3cc80ccd150451eeae3060b4ae9e10b286d1f2bd088944d9c9be8de5ee4ff44629b59473ecb65fba3543247df77ade65d8e90e896aa78f0f45b8392582fa396f8278bfadfdd6d23c35b983d7501ffad7137", 0x70) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0185648, &(0x7f0000000280)={0x4, 0x2, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0xa00905, 0x5, [], @value=0xfffffff4}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x5, 0x80, 0x0, 0x1, 0x0, 0x0, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7481, 0x1, @perf_config_ext={0x6}, 0x2, 0x5, 0x10001, 0x1, 0x6caa, 0x1, 0x5780}, r3, 0x8, r4, 0x1) r5 = socket$bt_rfcomm(0x1f, 0x1, 0x3) setsockopt$bt_BT_VOICE(r5, 0x112, 0xb, &(0x7f00000002c0)=0x3, 0x2) ioctl$UI_DEV_DESTROY(r4, 0x5502) clock_gettime(0x0, &(0x7f0000005200)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000005180)=[{{&(0x7f0000000300)=@l2tp6, 0x80, &(0x7f0000000540)=[{&(0x7f0000000380)=""/117, 0x75}, {&(0x7f0000000400)=""/33, 0x21}, {&(0x7f0000000440)=""/12, 0xc}, {&(0x7f0000000480)=""/2, 0x2}, {&(0x7f00000004c0)=""/4, 0x4}, {&(0x7f0000000500)}], 0x6, &(0x7f0000000580)=""/200, 0xc8}, 0x9}, {{&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000700)=""/202, 0xca}, {&(0x7f0000000800)=""/73, 0x49}, {&(0x7f0000000880)=""/73, 0x49}, {&(0x7f0000000900)=""/190, 0xbe}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/120, 0x78}], 0x6, &(0x7f0000001a80)=""/4096, 0x1000}, 0xc8e}, {{&(0x7f0000002a80)=@isdn, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/219, 0xdb}, {&(0x7f0000003c00)=""/143, 0x8f}, {&(0x7f0000003cc0)=""/234, 0xea}, {&(0x7f0000003dc0)=""/232, 0xe8}], 0x5, &(0x7f0000003f00)=""/191, 0xbf}, 0xfffffffc}, {{&(0x7f0000003fc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000005080)=[{&(0x7f0000004040)=""/61, 0x3d}, {&(0x7f0000004080)=""/4096, 0x1000}], 0x2, &(0x7f00000050c0)=""/179, 0xb3}, 0x20}], 0x4, 0x22, &(0x7f0000005240)={r6, r7+30000000}) getpeername$unix(r8, &(0x7f0000005280), &(0x7f0000005300)=0x6e) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f0000005340), &(0x7f0000005380)=0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f00000053c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000005400)=@ccm_128={{0x304}, "0d923121a90a41d2", "085cc6cf3e0d2c84b360f9e27d962ec9", "6d221759", "b392ff795543cbd0"}, 0x28) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a45322, &(0x7f0000005440)) sysfs$1(0x1, &(0x7f0000005500)='\x8d\x00') ioctl$SOUND_MIXER_READ_RECSRC(r1, 0x80044dff, &(0x7f0000005540)) sendmsg$IPCTNL_MSG_CT_NEW(r8, &(0x7f0000005700)={&(0x7f0000005580)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000056c0)={&(0x7f00000055c0)={0xd8, 0x0, 0x1, 0x301, 0x0, 0x0, {0x1, 0x0, 0x8}, [@CTA_TUPLE_MASTER={0x44, 0xe, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @rand_addr="0d4af15f097f6cc16763ac61459f34e6"}}}]}, @CTA_LABELS={0x8, 0x16, [0x8000]}, @CTA_PROTOINFO={0x40, 0x4, @CTA_PROTOINFO_SCTP={0x3c, 0x3, [@CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x6}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x5}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x1}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8, 0x2, 0xc2d}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0xa4}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8, 0x3, 0x1}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8, 0x2, 0x6}]}}, @CTA_MARK={0x8, 0x8, 0xffff8000}, @CTA_LABELS_MASK={0x10, 0x17, [0xba9, 0x0, 0xfffffff7]}, @CTA_PROTOINFO={0x20, 0x4, @CTA_PROTOINFO_DCCP={0x1c, 0x2, [@CTA_PROTOINFO_DCCP_STATE={0x5, 0x1, 0xb5}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x81}, @CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x4}]}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x44080}, 0x40000001) r9 = syz_open_dev$vcsu(&(0x7f0000005740)='/dev/vcsu#\x00', 0xfffffffb, 0x309000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r9, 0x6, 0x21, &(0x7f0000005780)="bde6987ff115dba81dc78ad7ec2bf230", 0x10) r10 = openat$bsg(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/bsg\x00', 0x82480, 0x0) ioctl$UI_SET_PHYS(r10, 0x4004556c, &(0x7f0000005800)='syz0\x00') r11 = openat$full(0xffffffffffffff9c, &(0x7f0000005840)='/dev/full\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r11, 0x84, 0x18, &(0x7f0000005880)={0x0, 0x9}, 0x8) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0445609, &(0x7f00000058c0)={0x370a1639, 0x1, 0x4, 0x80000000, 0x3ff, {0x0, 0x7530}, {0x1, 0x2, 0x7, 0x6, 0x8, 0x7, "271027fc"}, 0x0, 0x1, @userptr=0x1, 0x5, 0x0, r2}) ioctl$NS_GET_USERNS(r12, 0xb701, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r11, 0x8982, &(0x7f0000005940)) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f00000059c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r12, &(0x7f0000005a80)={&(0x7f0000005980)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000005a40)={&(0x7f0000005a00)={0x1c, r13, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40814}, 0x8048001) syzkaller login: [ 208.631790][ T9988] IPVS: ftp: loaded support on port[0] = 21 [ 208.795419][ T9988] chnl_net:caif_netlink_parms(): no params data found [ 208.839425][ T9991] IPVS: ftp: loaded support on port[0] = 21 [ 208.888219][ T9988] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.896279][ T9988] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.905084][ T9988] device bridge_slave_0 entered promiscuous mode [ 208.917308][ T9988] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.924621][ T9988] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.933058][ T9988] device bridge_slave_1 entered promiscuous mode [ 208.987445][ T9988] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.026682][ T9988] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:40:03 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="87109d7356d152d4602fabac27458a1aa2100cf16d14a9a5a878aff86ef3f704825704ef373b0de8d7998d7db57f41a4f456633e570a859f2087ad2aa5576a71c24c0694", 0x44, 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, r0, 0x1ff, 0x811, r1) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFT_MSG_GETSETELEM(r2, &(0x7f0000002a00)={&(0x7f0000002900)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000029c0)={&(0x7f0000002940)={0x68, 0xd, 0xa, 0x201, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x81) pipe2$9p(&(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RSTATFS(r4, &(0x7f0000002a80)={0x43, 0x9, 0x1, {0x4, 0x7d4, 0x9, 0x9, 0x2, 0x3f, 0x3f, 0xffffffff, 0xff}}, 0x43) splice(r3, &(0x7f0000002b00)=0xd8, r3, &(0x7f0000002b40)=0x10001, 0x401, 0x3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002c00)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@initdev}}, &(0x7f0000002d00)=0xe4) lstat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() mount$fuse(0x0, &(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)='fuse\x00', 0x202c000, &(0x7f0000002e00)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@allow_other='allow_other'}], [{@fowner_lt={'fowner<', r7}}, {@appraise='appraise'}]}}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000002f00), &(0x7f0000002f40)=0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000002f80)={@multicast1, @dev, 0x0}, &(0x7f0000002fc0)=0xc) statx(0xffffffffffffffff, &(0x7f0000003000)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000003040)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003140)={{{@in6=@empty, @in6=@remote, 0x4e20, 0xfc, 0x4e22, 0x5e, 0x2, 0x0, 0xd56e49f00ad627e7, 0x33, r8, r9}, {0x5, 0x5, 0x8, 0x9, 0xfff, 0x2, 0x4, 0xfff}, {0x9, 0x200, 0x0, 0xe633}, 0x1, 0x6e6bbd, 0x1, 0x1, 0x2, 0x1}, {{@in6=@loopback, 0x4d4, 0x3c}, 0xa, @in=@broadcast, 0x34ff, 0x0, 0x2, 0x3, 0x7, 0x7, 0xfffffe81}}, 0xe4) r10 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r10, 0x40044149, &(0x7f0000003240)=0xcb3) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f0000003380)={&(0x7f0000003280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000003340)={&(0x7f00000032c0)={0x4c, 0xe, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x4c}}, 0x80) setsockopt$inet_group_source_req(r10, 0x0, 0x2c, &(0x7f00000033c0)={0xfda8, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e23, @multicast1}}}, 0x104) r11 = syz_open_dev$mice(&(0x7f0000003500)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000003540)={'syzkaller0\x00', @local}) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000003580)='/dev/null\x00', 0x101200, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r12, 0x4008af14, &(0x7f00000035c0)={0x0, 0xffffff9b}) memfd_create(&(0x7f0000003600)='\x00', 0x2) r13 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003640)='/dev/snapshot\x00', 0xa0400, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r13, 0x29, 0x20, &(0x7f0000003680)={@local, 0x7, 0x0, 0x3, 0x2, 0x5, 0x8000}, 0x20) write(r13, &(0x7f00000036c0)="08111ebdda0db9188051ddb1c5d69d393dacd2ccdea088b765bf4fd1b0d1ed4c8470800b209e1d82c50b95104afcbb3f6a7c77e620a40eda8837c505fe68f99fc1bc4abb93cd14c0328b79e7493942033d59ed7b3f08e4ee", 0x58) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000037c0)={0x9, &(0x7f0000003740)=[{0x1ff, 0x7f, 0x7, 0x100}, {0x0, 0x3f, 0x3, 0x2}, {0x3f, 0x4, 0x7f, 0x1ff}, {0x1, 0x3, 0x2, 0x9}, {0x0, 0x9, 0x3f, 0x1ff}, {0x5, 0x80, 0x8, 0x1}, {0x400, 0x81, 0x73, 0x8}, {0x3, 0x1f, 0x0, 0x5}, {0x9, 0x8, 0x5, 0x6}]}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000003800)={0x15, 0x65, 0xffff, 0xffff, 0x8, '9P2000.L'}, 0x15) [ 209.067228][ T9988] team0: Port device team_slave_0 added [ 209.095625][ T9988] team0: Port device team_slave_1 added [ 209.138414][ T9988] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 209.151722][ T9988] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.211721][ T9988] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 209.233340][ T9991] chnl_net:caif_netlink_parms(): no params data found [ 209.253464][ T9988] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 209.260491][ T9988] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.287291][ T9988] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 209.366097][ T9988] device hsr_slave_0 entered promiscuous mode [ 209.390109][ T9994] IPVS: ftp: loaded support on port[0] = 21 14:40:03 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20020002}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x84, 0x0, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "630343931eb89b5853834f6f2b"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}, @NL80211_ATTR_KEY_SEQ={0x7, 0xa, "719bb0"}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "4596b13d58c9a1fd0f127d1a46"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}]}, 0x84}, 0x1, 0x0, 0x0, 0x40000}, 0x6000050) times(&(0x7f0000000200)) shmget(0x2, 0x3000, 0x400, &(0x7f0000ffc000/0x3000)=nil) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x10100, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x8}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000003c0)={r2, @in={{0x2, 0x4e21, @broadcast}}}, &(0x7f0000000480)=0x84) r3 = syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0x3, 0x80000) write$UHID_CREATE(r3, &(0x7f0000000540)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000500), 0x0, 0x8, 0x8, 0x9, 0x9, 0x8}}, 0x11c) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000740)='/dev/bsg\x00', 0x101100, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f0000000780)=@srh={0x0, 0x4, 0x4, 0x2, 0x30, 0x8, 0x6, [@local, @empty]}, 0x28) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f00000007c0)) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000800)='/dev/autofs\x00', 0x480002, 0x0) ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f0000000840)=""/206) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc044560f, &(0x7f0000000980)={0x2, 0xf4f98e6a04be3fe1, 0x4, 0x400, 0xea, {}, {0x4, 0xc, 0x2, 0x3, 0x5, 0x1f, "078dc1b7"}, 0x563, 0x2, @planes=&(0x7f0000000940)={0xffe0, 0x2, @userptr=0xc4, 0xb4}, 0x3, 0x0, 0xffffffffffffffff}) pidfd_send_signal(r6, 0xa, &(0x7f0000000a00)={0xa, 0x7fffffff, 0x5}, 0x0) name_to_handle_at(r0, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)={0x86, 0x401, "b74f0c9f079f0389f197744f9707b55b7819f103cf60d5fa2f830cff156f1dd89ca6fe499da93a670537e8cc0bb84692b31c3bb128fa07c4bb13440d972bc79e4e6f1aa7db37d842d65ee5f4ea6b72da2d6a8e87bcae298983d146db6bb0f7422d822ee68a478dcd3135cc8229c9f5e9132024d364b13b6fbfda6131fed1"}, &(0x7f0000000b80), 0x1400) r7 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$EVIOCSMASK(r7, 0x40104593, &(0x7f0000000c40)={0x17, 0x55, &(0x7f0000000bc0)="3a4e831f95d33c595a4b963e29ead2a39dbaec7ee7f6aa95a5690af2fc1ce1afaa91a552333a6cc11eb0eba7e7cc4a2cb461aca1c7aa4dbf88cab6c358369584c58d939ec677e132057744509ddfd5c91ad7907ae5"}) r8 = semget$private(0x0, 0x0, 0x8) semctl$IPC_INFO(r8, 0x2, 0x3, &(0x7f0000000c80)=""/41) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000cc0)=0x6, 0x4) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000d40)='nl80211\x00') sendmsg$NL80211_CMD_SET_MPATH(r4, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x1c, r9, 0x2, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x10040) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000ec0)={0x0, 0x48, &(0x7f0000000e40)=[@in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e23, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x3b}}, 0xc2edab3}, @in6={0xa, 0x4e22, 0x80000000, @remote, 0x80000001}]}, &(0x7f0000000f00)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000f40)={r10, 0x2}, &(0x7f0000000f80)=0x8) r11 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r11, 0x0, 0x14, &(0x7f0000000fc0), 0x4) [ 209.422332][ T9988] device hsr_slave_1 entered promiscuous mode [ 209.594303][ T9991] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.601525][ T9991] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.623863][ T9991] device bridge_slave_0 entered promiscuous mode [ 209.657565][ T9991] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.672107][ T9996] IPVS: ftp: loaded support on port[0] = 21 [ 209.673844][ T9991] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.693101][ T9991] device bridge_slave_1 entered promiscuous mode [ 209.768401][ T9991] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.784494][ T9991] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:40:04 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000000080)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f00000000c0)=0x6) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2000, 0x0) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r1, 0x80104132, &(0x7f0000000140)) ioctl$VIDIOC_DQBUF(r0, 0xc0445611, &(0x7f0000000180)={0x9, 0x4, 0x4, 0x40, 0x10000, {0x0, 0x2710}, {0x2, 0xc, 0x4, 0x60, 0x5, 0x0, "d90e681d"}, 0x2, 0x4, @userptr=0x6b93, 0x1, 0x0, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000200)=0x7, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0445609, &(0x7f0000000240)={0x0, 0xc, 0x4, 0x40000, 0x200, {0x0, 0x7530}, {0x3, 0x8, 0xcf, 0x40, 0xfe, 0x2, "23738cbb"}, 0x81, 0x2, @fd, 0xfff, 0x0, r0}) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x8040, 0x0) write$P9_RWRITE(r4, &(0x7f0000000300)={0xb, 0x77, 0x2, 0x10000}, 0xb) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000380)=@sack_info={0x0, 0x0, 0x400}, &(0x7f00000003c0)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000400)={r6, 0x24, "4eb4ba35a755f9b52aa343259c29daefb9865e4d489df93138a148b961c663e8f94ae650"}, &(0x7f0000000440)=0x2c) r7 = syz_open_dev$radio(&(0x7f0000000480)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBDEV_G_SELECTION(r7, 0xc040563d, &(0x7f00000004c0)={0x1, 0x0, 0x101, 0x4, {0x8, 0x60a65c67, 0x4, 0x1}}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x4, 0x3b8, 0xf0, 0x214, 0xf0, 0x214, 0x0, 0x324, 0x324, 0x324, 0x324, 0x324, 0x4, &(0x7f0000000500), {[{{@uncond, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x5, 0x5, 0x6, 0x6, 0x6], 0x2, 0x2}, {0x1, [0x1, 0x4, 0x0, 0x2, 0x5, 0x1], 0x0, 0x6}}}}, {{@uncond, 0x0, 0x100, 0x124, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x0, [0x6, 0x4, 0x2, 0x0, 0x0, 0x3], 0x4}}}, @common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xa, 0x1, 0x2}}]}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x3}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x14}, 0xffffffff, 0xffffffff, 'netdevsim0\x00', 'veth0\x00', {}, {0xff}, 0x8, 0x0, 0x40}, 0x0, 0xec, 0x110, 0x0, {}, [@common=@addrtype={{0x2c, 'addrtype\x00'}, {0x10, 0x88, 0x0, 0x1}}, @common=@osf={{0x50, 'osf\x00'}, {'syz0\x00', 0x0, 0x8, 0x1, 0x2}}]}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x414) eventfd2(0x1, 0x800) accept4$unix(r2, &(0x7f0000000980), &(0x7f0000000a00)=0x6e, 0x800) r8 = open(&(0x7f0000000a40)='./file0\x00', 0x2000, 0x320) ioctl$VIDIOC_G_FMT(r8, 0xc0cc5604, &(0x7f0000000a80)={0x0, @raw_data="a4638ed635be448824fab3f2c2b3fad86d3c4de68d4b9eaee503230f1c20f8fc41a4a094551f1d098c4ff95a7224bd3fe4b5b58bed506d1075bea7059f03a1f1effcf16108bb9052f832255950fdbe7b4b559c9fb94e8afd537e0bb9d276cc0b9812f77b075c33ba53c2c085ba5aa76c0fd4500efe03f2b78af42f893531f8bed5ef12f73e27f3aaca0f1636fbbd4d698dc3914857e8a144cf9a90e042dee766f0ea557d1a939419c41de3682c790025da7006a39bbdeab1b5bee4964dc63db6554eff2dcb5313e4"}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000b80)=[@in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, @in6={0xa, 0x4e20, 0x47f2e1fa, @dev={0xfe, 0x80, [], 0x1e}, 0x9}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x18}}, @in6={0xa, 0x4e23, 0x36d6, @mcast2, 0x80}], 0x68) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0e05403, &(0x7f0000000c00)={{0xffffffffffffffff, 0x2, 0x3}, 0x3, 0x377b9f2, 'id1\x00', 'timer0\x00', 0x0, 0x8001, 0x8000, 0x7ff, 0x223}) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r9, &(0x7f0000000d00)=""/209, 0xd1, 0x12042, &(0x7f0000000e00)=@ethernet={0x6, @dev={[], 0x29}}, 0x80) r10 = accept4(0xffffffffffffffff, &(0x7f0000000e80)=@alg, &(0x7f0000000f00)=0x80, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000f80)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r10, &(0x7f00000010c0)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001080)={&(0x7f0000000fc0)={0xc0, r11, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x6}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x48}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3a}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x20}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x87}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4040190}, 0x40800) write$UHID_CREATE(r8, &(0x7f0000002100)={0x0, {'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000001100)=""/4096, 0x1000, 0x6c9, 0xffffffff, 0x100, 0x0, 0x8}}, 0x11c) [ 209.865995][ T9991] team0: Port device team_slave_0 added [ 209.892103][ T9991] team0: Port device team_slave_1 added [ 210.032869][ T9988] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 210.096609][ T9999] IPVS: ftp: loaded support on port[0] = 21 [ 210.119694][ T9988] netdevsim netdevsim0 netdevsim1: renamed from eth1 14:40:04 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x80000001, 0x10001, 0x7ff, 0x3, 0x40}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={r1, @in={{0x2, 0x4e20, @multicast2}}, [0x8, 0xfff, 0x3, 0x6, 0xff, 0x9, 0x8, 0x8, 0x6, 0x9, 0x3, 0x21, 0x10000, 0x628, 0x3]}, &(0x7f0000000200)=0xfc) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r1, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000300)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x6c, r4, 0x1, 0x70bd27, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7f}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_SESSION_ID={0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8080}, 0x81) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, &(0x7f0000000440)=0x3) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000480)={'xfrm0\x00', {0x2, 0x4e23, @multicast2}}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000780), &(0x7f00000007c0)=0x4) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vsock\x00', 0x82000, 0x0) ioctl$VIDIOC_DECODER_CMD(r6, 0xc0485660, &(0x7f0000000840)={0x1, 0x2, @raw_data=[0x80e, 0x3, 0x8, 0x1c35, 0x9, 0x7, 0x5, 0x8, 0x398e, 0x5, 0x80000000, 0x6, 0x5, 0x4, 0x0, 0xfffff801]}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f00000008c0)={0x1ff, 0x1, 0xffffffff, 0x0, 0x6}) write$P9_RUNLINKAT(r5, &(0x7f0000000900)={0x7, 0x4d, 0x1}, 0x7) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0086401, &(0x7f0000000980)={0x4, &(0x7f0000000940)=""/4}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a00)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f0000000b00)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x68, r8, 0x8, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x9, @link='syz0\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40004}, 0x80) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/vcsa\x00', 0x41, 0x0) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000bc0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r9, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x204800}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x2c, r10, 0x100, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'caif0\x00'}}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) socket$nl_generic(0x10, 0x3, 0x10) socket$alg(0x26, 0x5, 0x0) recvmsg$can_j1939(r5, &(0x7f0000002000)={&(0x7f0000000cc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000000d40)=""/157, 0x9d}, {&(0x7f0000000e00)=""/83, 0x53}, {&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/83, 0x53}], 0x4, &(0x7f0000001f40)=""/130, 0x82}, 0x12000) ioctl$sock_SIOCBRADDBR(r11, 0x89a0, &(0x7f0000002040)='ip6tnl0\x00') r12 = syz_open_dev$mouse(&(0x7f0000002080)='/dev/input/mouse#\x00', 0x2, 0x97fd7cef327b2907) setsockopt$packet_tx_ring(r12, 0x107, 0xd, &(0x7f00000020c0)=@req={0x1000, 0xffffffff, 0x1ff, 0x9}, 0x10) write$P9_RCREATE(r7, &(0x7f0000002100)={0x18, 0x73, 0x1, {{0x40, 0x4, 0x6}, 0x101}}, 0x18) socket$bt_cmtp(0x1f, 0x3, 0x5) [ 210.283588][ T9991] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 210.290580][ T9991] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.319736][ T9991] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 210.339816][ T9991] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 210.346875][ T9991] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 210.375620][ T9991] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 210.387659][ T9988] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 210.404023][T10002] IPVS: ftp: loaded support on port[0] = 21 [ 210.446516][ T9988] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 210.520742][ T9996] chnl_net:caif_netlink_parms(): no params data found [ 210.531030][ T9994] chnl_net:caif_netlink_parms(): no params data found [ 210.624214][ T9991] device hsr_slave_0 entered promiscuous mode [ 210.662644][ T9991] device hsr_slave_1 entered promiscuous mode [ 210.721880][ T9991] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 210.732049][ T9991] Cannot create hsr debugfs directory [ 210.806650][ T9994] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.813914][ T9994] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.822794][ T9994] device bridge_slave_0 entered promiscuous mode [ 210.833148][ T9994] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.840437][ T9994] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.848918][ T9994] device bridge_slave_1 entered promiscuous mode [ 210.906561][ T9996] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.913935][ T9996] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.922961][ T9996] device bridge_slave_0 entered promiscuous mode [ 210.950524][ T9994] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.960579][ T9996] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.968644][ T9996] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.977562][ T9996] device bridge_slave_1 entered promiscuous mode [ 211.015723][ T9994] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.101969][ T9996] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.121152][ T9994] team0: Port device team_slave_0 added [ 211.130857][ T9994] team0: Port device team_slave_1 added [ 211.140265][T10002] chnl_net:caif_netlink_parms(): no params data found [ 211.175511][ T9996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.198649][ T9994] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 211.205791][ T9994] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.232470][ T9994] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 211.281921][ T9994] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 211.289238][ T9994] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.315667][ T9994] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 211.356704][ T9996] team0: Port device team_slave_0 added [ 211.445572][ T9994] device hsr_slave_0 entered promiscuous mode [ 211.502222][ T9994] device hsr_slave_1 entered promiscuous mode [ 211.571856][ T9994] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 211.579893][ T9994] Cannot create hsr debugfs directory [ 211.587156][ T9996] team0: Port device team_slave_1 added [ 211.603383][T10002] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.610615][T10002] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.619372][T10002] device bridge_slave_0 entered promiscuous mode [ 211.627203][ T9999] chnl_net:caif_netlink_parms(): no params data found [ 211.665239][T10002] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.672705][T10002] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.682440][T10002] device bridge_slave_1 entered promiscuous mode [ 211.717279][ T9996] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 211.724665][ T9996] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.751425][ T9996] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 211.764786][T10002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.793631][ T9991] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 211.844411][ T9996] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 211.851417][ T9996] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.879547][ T9996] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 211.898524][T10002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.924325][ T9991] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 211.979506][ T9999] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.988423][ T9999] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.997810][ T9999] device bridge_slave_0 entered promiscuous mode [ 212.010054][ T9988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.017744][ T9991] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 212.058959][ T9991] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 212.124228][ T9999] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.131433][ T9999] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.140709][ T9999] device bridge_slave_1 entered promiscuous mode [ 212.166320][T10002] team0: Port device team_slave_0 added [ 212.205228][ T9996] device hsr_slave_0 entered promiscuous mode [ 212.242403][ T9996] device hsr_slave_1 entered promiscuous mode [ 212.291873][ T9996] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 212.299633][ T9996] Cannot create hsr debugfs directory [ 212.333786][T10002] team0: Port device team_slave_1 added [ 212.352351][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.361170][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.374125][ T9999] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.416480][ T9988] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.428148][ T9999] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.475227][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.488005][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.497180][ T2723] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.504462][ T2723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.514633][T10002] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 212.514651][T10002] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.514666][T10002] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 212.516696][T10002] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 212.567231][T10002] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.594104][T10002] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 212.625495][ T9999] team0: Port device team_slave_0 added [ 212.639403][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.647626][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.657153][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.666704][ T2733] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.674000][ T2733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.709983][ T9999] team0: Port device team_slave_1 added [ 212.733601][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.742488][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.751404][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.760479][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.810174][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.818771][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.827717][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.863313][ T9999] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 212.870297][ T9999] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.899850][ T9999] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 212.921136][ T9999] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 212.928423][ T9999] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.957259][ T9999] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.023950][T10002] device hsr_slave_0 entered promiscuous mode [ 213.082080][T10002] device hsr_slave_1 entered promiscuous mode [ 213.141861][T10002] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.149442][T10002] Cannot create hsr debugfs directory [ 213.158700][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.167765][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.177102][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.186375][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.199025][ T9988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.211113][ T9994] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 213.261118][ T9994] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 213.336863][ T9994] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 213.403885][ T9994] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 213.484938][ T9999] device hsr_slave_0 entered promiscuous mode [ 213.542454][ T9999] device hsr_slave_1 entered promiscuous mode [ 213.582160][ T9999] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 213.589833][ T9999] Cannot create hsr debugfs directory [ 213.596976][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 213.604739][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 213.637850][ T9996] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 213.699067][ T9988] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.720081][ T9996] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 213.758963][ T9996] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 213.838984][ T9996] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 213.904997][ T9991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.935104][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.944625][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.992713][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.000521][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.068342][ T9991] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.122072][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 214.130469][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.157948][ T9994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.185312][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.193916][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.202652][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.211372][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.220719][ T3000] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.227897][ T3000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.236299][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.245096][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.254182][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.266584][ T9988] device veth0_vlan entered promiscuous mode [ 214.282403][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.291136][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.303713][ T2883] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.310956][ T2883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.332234][ T9999] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 214.379170][ T9999] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 214.434745][ T9999] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 214.489083][ T9999] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 214.563875][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.575174][ T9994] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.591136][T10002] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 214.650045][T10002] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 214.722993][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.746364][ T9988] device veth1_vlan entered promiscuous mode [ 214.755406][T10002] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 214.839139][T10002] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 214.907540][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.919574][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.928865][ T2883] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.936167][ T2883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.952923][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.983601][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.993112][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.002716][ T2883] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.009913][ T2883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.018085][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.026852][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.035996][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.044814][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.073222][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.081275][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.090461][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.099167][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.142361][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.151235][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.160835][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.171294][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.179906][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.189118][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.231124][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.240280][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.259014][ T9996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.285300][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.295378][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.304588][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.314480][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.326420][ T9988] device veth0_macvtap entered promiscuous mode [ 215.365211][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 215.378149][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.387007][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.396761][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.405600][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.424182][ T9988] device veth1_macvtap entered promiscuous mode [ 215.439835][ T9996] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.457415][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.470621][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.480319][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.488362][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.497487][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.506440][ T2723] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.513618][ T2723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.523061][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.532994][ T9994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.555680][ T9999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.578197][ T9991] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.588219][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.601003][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.611239][ T2883] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.618388][ T2883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.646818][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.657710][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.697286][ T9988] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 215.707554][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.716386][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.724923][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.737242][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.747362][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.758238][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.767202][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.776562][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 215.786795][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.816287][ T9999] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.827659][ T9988] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 215.842610][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.851217][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.866430][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.875746][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.884691][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.893623][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.902807][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.910486][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.961105][T10002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.975381][ T9996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.984236][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.994847][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.004322][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.013575][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.022559][ T2733] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.029636][ T2733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.037688][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.063627][ T9994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.095957][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.108228][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.120099][ T2887] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.127275][ T2887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.174341][T10002] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.196021][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.207444][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.219518][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.236679][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.245433][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.253838][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.261484][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.270915][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.281140][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.289108][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.297503][ T9991] device veth0_vlan entered promiscuous mode [ 216.354112][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.370997][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.388008][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.399472][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.417212][ T2733] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.424664][ T2733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.433142][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.442808][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.451670][ T2733] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.458978][ T2733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.467589][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.477280][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.486905][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.499310][ T9996] 8021q: adding VLAN 0 to HW filter on device batadv0 14:40:10 executing program 0: [ 216.544788][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.557829][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.567328][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.577690][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.587137][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.597124][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.606978][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.621392][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.638197][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 14:40:10 executing program 0: [ 216.652926][ T9991] device veth1_vlan entered promiscuous mode [ 216.664642][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.742299][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.751093][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.779437][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 14:40:10 executing program 0: [ 216.789777][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.802331][ T9999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 14:40:11 executing program 0: [ 216.856736][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.875133][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.898020][ T9994] device veth0_vlan entered promiscuous mode 14:40:11 executing program 0: [ 216.960677][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.974710][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.983462][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.999738][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 14:40:11 executing program 0: [ 217.009267][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.047979][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.065057][T10002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.097493][ T9991] device veth0_macvtap entered promiscuous mode 14:40:11 executing program 0: [ 217.111285][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.120577][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.129254][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 217.139180][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.148922][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.171236][ T9999] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.206988][ T9994] device veth1_vlan entered promiscuous mode [ 217.220121][ T9991] device veth1_macvtap entered promiscuous mode [ 217.230421][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.240243][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.259324][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.267296][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.352122][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.360475][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.377636][ T9996] device veth0_vlan entered promiscuous mode [ 217.399869][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.408857][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.423044][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.433154][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.457246][ T9991] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.476133][ T9991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.489788][ T9991] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 217.517330][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.525667][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.534080][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.543227][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.561183][ T9991] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.573075][ T9991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.584923][ T9991] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 217.597623][T10002] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.608424][ T9994] device veth0_macvtap entered promiscuous mode [ 217.619558][ T9996] device veth1_vlan entered promiscuous mode [ 217.628274][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.636613][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.645883][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.654960][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.664670][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.674916][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 217.696166][ T9994] device veth1_macvtap entered promiscuous mode [ 217.719304][ T9999] device veth0_vlan entered promiscuous mode [ 217.746763][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.758068][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.776489][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.785186][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.794969][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.803204][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.849583][ T9999] device veth1_vlan entered promiscuous mode [ 217.875194][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.891507][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.908511][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.921196][ T9994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.938722][ T9994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:40:12 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000080603000000000000000000000000000500010007000000d3e5a6e59014e16c4cebef1f6adbefffadb53aeae91726285b9e85c97b59a9a40aa7bfd9df9f49a8e16780b7c7424ce6b839ba785cf70a6bfc17d3260223bc0afbf5ef0b4cc7ee4daacb050cae0260720487994b7c29ddbe3b851bae2131e73841b7d01d69edcb8c0430a39585679205000000eafc80a22c60f6f0e5e652d56f285f4f2a9513b7254306da439159fab84ba66771172d2a3eacc5fc624237c693f6000000000000009c436ef61b6968"], 0x1c}}, 0x4) [ 217.949431][ T9994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.969184][ T9994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.988281][ T9994] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.032849][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 218.049652][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.058691][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.071567][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.080813][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.093371][ T9994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.104992][ T9994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.118064][ T9994] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.130802][ T9994] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.147320][ T9994] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.165271][ T9996] device veth0_macvtap entered promiscuous mode [ 218.182636][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.190890][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.203575][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.213707][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.225307][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.234966][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.243908][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.266339][ T9996] device veth1_macvtap entered promiscuous mode [ 218.276710][T10002] device veth0_vlan entered promiscuous mode [ 218.382511][T10002] device veth1_vlan entered promiscuous mode [ 218.396730][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.407400][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.427051][ T9996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.438537][ T9996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.448953][ T9996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.459679][ T9996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.469683][ T9996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.481075][ T9996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.499021][ T9996] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.509564][ T9999] device veth0_macvtap entered promiscuous mode [ 218.531793][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.540411][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.550264][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.579237][ T9996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.603228][ T9996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.627772][ T9996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.638418][ T9996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.648856][ T9996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.660435][ T9996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 14:40:12 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000140)=@id, 0x10) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") [ 218.673842][ T9996] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 218.684225][ T9999] device veth1_macvtap entered promiscuous mode [ 218.708641][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.733358][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.752349][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.835822][ T9999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.849323][ T9999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.859982][ T9999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.884685][ T9999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.895862][ T9999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.907397][ T9999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.917460][ T9999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.934910][ T9999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.947720][ T9999] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.962501][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.973596][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.982832][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.992522][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.004006][ T9999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.015454][ T9999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.025868][ T9999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.037529][ T9999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.047868][ T9999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.059374][ T9999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.069732][ T9999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.080624][ T9999] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.093602][ T9999] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 219.116674][T10002] device veth0_macvtap entered promiscuous mode [ 219.153339][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 219.164714][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.178408][ T2887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 14:40:13 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) write$P9_RAUTH(r2, 0x0, 0x0) [ 219.205958][T10002] device veth1_macvtap entered promiscuous mode [ 219.242073][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.325064][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.358385][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.368922][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.381179][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.391222][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.402215][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.425000][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.435704][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.446095][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.459901][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.475552][T10002] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 219.493012][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.504060][ T2883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.515954][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.527570][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.538397][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.549729][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.559844][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.573179][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.583187][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.593776][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.603738][T10002] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.614502][T10002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.626986][T10002] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 219.642387][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.651260][ T2829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 14:40:13 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) gettid() ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') [ 219.712264][T10055] Unknown ioctl -1073459190 [ 219.721087][T10055] Unknown ioctl -1069263343 [ 219.738121][T10055] Unknown ioctl -1073459190 [ 219.744796][T10057] Unknown ioctl -1069263343 14:40:14 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='bdev!)-%+wlan0posix_acl_access}\x00'}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400c00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0xb139683faff424d2, 0x0, 0x3, 0x4, 0xc1, 0x4, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 14:40:14 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="d57f00e4ffffffffffff12"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100003000, 0x0) 14:40:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d282c300dcf76acd68e9f5867fe7c0eb8b100576987a7dfaa8a1fed461069ecca85c7d5c0707e8bf"], 0x34) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [], 0xa, "39980cfd42119cc4e1040300"/25}, 0x24) 14:40:14 executing program 2: r0 = eventfd(0x0) ioctl$FICLONERANGE(r0, 0x5450, 0x0) 14:40:14 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') [ 219.889475][T10063] Unknown ioctl -1069001120 [ 219.897611][ C0] hrtimer: interrupt took 42533 ns [ 219.909660][T10064] Unknown ioctl -1069001120 14:40:14 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') write$sndseq(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:40:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000020a01000000000000000000000000000900010073797a300000000038000000120a0105000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:40:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r4, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc}]}, 0x28}}, 0x0) 14:40:14 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="d57f00e4ffffffffffff12"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100003000, 0x0) 14:40:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r1, 0x221, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1}}]}, 0x28}}, 0x0) mkdir(0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x80086601, 0x0) 14:40:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={{0x14}, [@NFT_MSG_NEWRULE={0x628, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x4c0, 0x4, 0x0, 0x1, [{0xd0, 0x1, 0x0, 0x1, [@numgen={{0xb, 0x1, 'numgen\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_NG_OFFSET={0x8, 0x4, 0x1, 0x0, 0x9b}]}}, @notrack={{0xc, 0x1, 'notrack\x00'}, @val={0x4}}, @log={{0x8, 0x1, 'log\x00'}, @void}, @target={{0xb, 0x1, 'target\x00'}, @void}, @dynset={{0xb, 0x1, 'dynset\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_DYNSET_SET_ID={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_DYNSET_SREG_KEY={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_DYNSET_SET_ID={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_DYNSET_TIMEOUT={0xc, 0x6, 0x1, 0x0, 0xcce}, @NFTA_DYNSET_SREG_DATA={0x8, 0x5, 0x1, 0x0, 0x15}, @NFTA_DYNSET_SREG_DATA={0x8, 0x5, 0x1, 0x0, 0x95f9052da210856c}, @NFTA_DYNSET_SET_NAME={0x9, 0x1, 'syz2\x00'}]}}, @range={{0xa, 0x1, 'range\x00'}, @void}, @redir={{0xa, 0x1, 'redir\x00'}, @void}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL={0x5, 0x2, 0x2}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0xb}]}}, @socket={{0xb, 0x1, 'socket\x00'}, @void}]}, {0xf0, 0x1, 0x0, 0x1, [@ct={{0x7, 0x1, 'ct\x00'}, @void}, @match={{0xa, 0x1, 'match\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x7}, @NFTA_MATCH_NAME={0xe, 0x1, 'proc)self\x00'}, @NFTA_MATCH_NAME={0x8, 0x1, '#$$\x00'}, @NFTA_MATCH_NAME={0x20, 0x1, 'mime_type#vboxnet1\\vboxnet1\x00'}]}}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0x10}, @NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xd}, @NFTA_TUNNEL_MODE={0x8, 0x3, 0x1, 0x0, 0x1}]}}, @limit={{0xa, 0x1, 'limit\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LIMIT_BURST={0x8, 0x3, 0x1, 0x0, 0xf4}]}}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @void}, @dynset={{0xb, 0x1, 'dynset\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DYNSET_OP={0x8, 0x3, 0x1, 0x0, 0x1}]}}]}, {0xb8, 0x1, 0x0, 0x1, [@dup_ipv4={{0x8, 0x1, 'dup\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_ADDR={0x8, 0x1, 0x1, 0x0, 0x3}]}}, @hash={{0x9, 0x1, 'hash\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_HASH_TYPE={0x8}, @NFTA_HASH_MODULUS={0x8, 0x4, 0x1, 0x0, 0x6}, @NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_HASH_TYPE={0x8}, @NFTA_HASH_TYPE={0x8}, @NFTA_HASH_SREG={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x750}, @NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0xecf1}, @NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0xf}]}}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}}]}, {0x10, 0x1, 0x0, 0x1, [@meta={{0x9, 0x1, 'meta\x00'}, @void}]}, {0x234, 0x1, 0x0, 0x1, [@fwd={{0x8, 0x1, 'fwd\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_DEV={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_FWD_SREG_DEV={0x8, 0x1, 0x1, 0x0, 0x10}]}}, @notrack={{0xc, 0x1, 'notrack\x00'}, @void}, @target={{0xb, 0x1, 'target\x00'}, @void}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @void}, @fwd={{0x8, 0x1, 'fwd\x00'}, @void}, @bitwise={{0xc, 0x1, 'bitwise\x00'}, @val={0x1d4, 0x2, 0x0, 0x1, [@NFTA_BITWISE_MASK={0x68, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x62, 0x1, "37fbfde11e0618ba8bc98c700addb2931abacc6e44e8b0cce7f2acebe3841ad86495f6a23a0d7f918ed031ddb9a6efd358c91eb08a6f8971a9ee7e23e6e91153137760862f0e17b8c16463bb928c3a1341f2b2b20ce4371aa8d4c3f7f01a"}]}, @NFTA_BITWISE_XOR={0xcc, 0x5, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x7ffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0xe, 0x1, "bc6eb8a6aa03975e4bbf"}, @NFTA_DATA_VALUE={0x2c, 0x1, "8b30e6eec0c58726f5d2219352e36fc20d9be0dc22c1e88c9f467b8186ba506555fb086845e7d714"}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x33, 0x1, "0b8d49dc6596118a13a344ace5c177ccb4964e66095d71bbb98fbfe7bcd3c94c2fbe2769f4a26c44e365a3fb97d1dc"}]}, @NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_BITWISE_XOR={0x94, 0x5, 0x0, 0x1, [@NFTA_DATA_VALUE={0x69, 0x1, "7291bca43ea2847e42621f0a07de808031ab20665dd1266bfa90c91f7d159da9ddc6537f6362a09395cc1f07b428c4fbacb91a020608a0fdf6835e3564d4affcf78ee99a6e96a242e8102e5a9a350c3133959a9573d8f46eacb8e8d5f2707013180b936e0c"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}]}}]}]}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_USERDATA={0x66, 0x7, 0x1, 0x0, "5614c3a98851769ee80f2037abe20471e4cc7b8b80f3cc7b83bb059f994079432f731bd1dd2a476499c9e283f3ee211a79f2edfeafdb83465bf447603b727c262342b376af385641a7b23feb150fb597866b9aa6aecf4105b8e1fae4a50901e83829"}, @NFTA_RULE_USERDATA={0xd8, 0x7, 0x1, 0x0, "953f9c1cc2acfa7d3711da7d792b65323b56918f1f62ea2bd9ba47291e09ca1dde69a71d477bd73e25855a559088f34f3df7811feda74b505f7cbfccf297addfd4114f11a54015208e855490131e7b9fcf5057074bf8062bb392feac7d801e1d84460dfb1ca3e70b266e1d4b9085fdab275afe4620196d893d19ff2257905d3113613a40b50b0d37316d549b76c7586f7a08fe73ecc960ae82b9aed354017a229ec51806545a752423594b5b4272aa8aad3083f58b828f796b2c48c4ef11fd88e93c62b0a2309ec4031d3e170b2352d29580b8a3"}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x5, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x67c}, 0x1, 0x0, 0x0, 0x7c125c506951de27}, 0x80) 14:40:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000100000001e6c0000000000000000000a20000000000a01000000000000000000000000000900010073797a300000000038000000120a0108000000000000000000000000040004800900020000397d00000000000900010073797a30000000000800034000000001140000001100df0000000000000000000000000a"], 0x80}}, 0x0) 14:40:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000001c0)={0x0, 0xf, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r1, 0x703}, 0x14}}, 0x0) 14:40:14 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:40:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/handlers\x00', 0x0, 0x0) 14:40:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/229) 14:40:14 executing program 2: socket(0x11, 0x800000003, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/packet\x00') r1 = socket$key(0xf, 0x3, 0x2) sendfile(r1, r0, 0x0, 0x80000001) 14:40:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='bdev!)-%+wlan0posix_acl_access}\x00'}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 14:40:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(r0, 0x4b32, 0x0) 14:40:15 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000001780)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x1, 0x2, {0x1, @raw_data="7c8601da29ef0a0b76fb6e417e3e1258adf963d232308a9feddfc7ad234e83a527e9e414899507f63032545ffd25b385a3f299a8f2ce0f56316ecbd7b6d5c36313434e47ef7b2588c1425aadf7ba3d2a87d3ed1fa6928d070001e359cf9597f25930a90c0e38bd93d440cdf1d4075a1ef6a238a6e19bd336081055a9fb8eded63dba89d4f14e401aa68910d3c0cb85e3918a656fa37cb8d942b420ed0feb9edd20fdd3b7dd1030a637433675b809a65800"}}) 14:40:15 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='bdev!)-%+wlan0posix_acl_access}\x00'}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400c00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 14:40:15 executing program 2: 14:40:15 executing program 5: 14:40:15 executing program 3: 14:40:15 executing program 0: 14:40:15 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r5, 0x0) ftruncate(r0, 0x48280) r6 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000000)={0x14}, 0x14) io_submit(r4, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r7, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r8 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r7) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000200)={0x0, r7, 0x9}) 14:40:15 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='bdev!)-%+wlan0posix_acl_access}\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) 14:40:15 executing program 1: 14:40:15 executing program 3: 14:40:15 executing program 0: 14:40:15 executing program 5: 14:40:15 executing program 2: 14:40:15 executing program 3: 14:40:15 executing program 0: 14:40:15 executing program 2: 14:40:15 executing program 4: 14:40:15 executing program 5: 14:40:16 executing program 1: 14:40:16 executing program 3: 14:40:16 executing program 2: 14:40:16 executing program 5: 14:40:16 executing program 0: 14:40:16 executing program 1: 14:40:16 executing program 4: 14:40:16 executing program 3: 14:40:16 executing program 2: 14:40:16 executing program 5: 14:40:16 executing program 0: 14:40:16 executing program 1: 14:40:16 executing program 4: 14:40:16 executing program 3: 14:40:16 executing program 5: 14:40:16 executing program 2: 14:40:16 executing program 1: 14:40:16 executing program 0: 14:40:16 executing program 4: 14:40:16 executing program 5: 14:40:17 executing program 3: 14:40:17 executing program 2: 14:40:17 executing program 1: 14:40:17 executing program 4: 14:40:17 executing program 0: 14:40:17 executing program 5: 14:40:17 executing program 2: 14:40:17 executing program 3: 14:40:17 executing program 0: 14:40:17 executing program 1: 14:40:17 executing program 4: 14:40:17 executing program 5: 14:40:17 executing program 2: 14:40:17 executing program 1: 14:40:17 executing program 3: 14:40:17 executing program 0: 14:40:17 executing program 4: 14:40:17 executing program 5: 14:40:17 executing program 2: 14:40:17 executing program 3: 14:40:17 executing program 1: 14:40:17 executing program 0: 14:40:17 executing program 2: 14:40:17 executing program 4: 14:40:17 executing program 5: 14:40:18 executing program 0: 14:40:18 executing program 1: 14:40:18 executing program 3: 14:40:18 executing program 5: 14:40:18 executing program 2: 14:40:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e6f142133d4a1cac53819fda"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x3fffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000280)={0x4}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) bpf$MAP_CREATE(0x0, 0x0, 0x0) 14:40:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe80, 0xffffffffffffffdd, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c5747c8", 0x0, 0x1000}, 0x28) 14:40:18 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 14:40:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e6f142133d4a1cac53819fda"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0004301c699da153f08a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)='syzkaller\x00'}, 0x30) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000600)={0xffffffffffffffff, &(0x7f0000000500), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600), 0xc) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x0, 0x2e15579, 0x0, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x5, 0x10001, 0x0, 0x0, 0x46d, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) 14:40:18 executing program 5: r0 = socket$kcm(0xa, 0x1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffff58) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89f2, &(0x7f0000000000)={r1}) 14:40:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x3a, 0x2, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) 14:40:18 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000001040)=""/4096, 0x1000}], 0x2, &(0x7f0000000ac0)=[{&(0x7f0000002040)=""/4096, 0x1000}], 0x1, 0x0) 14:40:18 executing program 3: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000880)='sysfs\x00', 0x0, 0x0) 14:40:18 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3, 0x0, &(0x7f0000001000)) 14:40:18 executing program 1: r0 = getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:40:18 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3c, 0x0, &(0x7f0000001000)) 14:40:18 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/4, 0x4}}], 0x1, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 14:40:18 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) 14:40:18 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x43, 0x0, &(0x7f0000001000)) 14:40:19 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/243, 0xf3}], 0x1, 0x1) 14:40:19 executing program 3: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x14, &(0x7f0000000000), 0x20a154cc) 14:40:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='pipefs\x00', 0x0, 0x0) 14:40:19 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0x0, 0x0, &(0x7f0000000000)=0xfffffe74) 14:40:19 executing program 5: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x2, 0x0, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x11, 0x0}, 0x50) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x134}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/60, 0x3c}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:40:19 executing program 2: unshare(0x400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) accept4(r0, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:40:19 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x8, 0x0, &(0x7f0000001000)) [ 225.360080][T10363] ptrace attach of "/root/syz-executor.5"[10362] was attempted by "/root/syz-executor.5"[10363] 14:40:19 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x33, 0x0, &(0x7f0000001000)) 14:40:19 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet6_int(r0, 0x28, 0x1, 0x0, &(0x7f0000000000)=0xfffffe74) 14:40:20 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x31, 0x0, &(0x7f0000001000)) 14:40:20 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4d, 0x0, &(0x7f0000001000)) 14:40:20 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/nf_conntrack\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/191, 0xbf}], 0x1, 0x0) 14:40:20 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0) 14:40:20 executing program 1: rt_sigaction(0x3c, &(0x7f0000000280)={&(0x7f00000001c0)="c4615c550d30fcea203ef2afc4c1be5eaae19600006766400f38db0a3e652e660f3822701a46f73506000000c4417e126ce09966440f289700000000c4c27d19a45100000081c461fd14698f", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 14:40:20 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4a, 0x0, &(0x7f0000001000)) 14:40:20 executing program 5: time(&(0x7f0000000100)) 14:40:20 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, 0x0, &(0x7f0000001000)) 14:40:20 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x12, 0x0, &(0x7f0000001000)) 14:40:20 executing program 0: rt_sigaction(0x40, &(0x7f0000000280)={&(0x7f0000000080)="c4615c550d30fcea203e75af0f380078323e64130f1b390f0ac48231be286ce09966440f2897000000008fc978c1f5c4e1f1e885bd171cf2", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 14:40:20 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 14:40:20 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x20, r3, 0x4c88cd1b8aee033f, 0x0, 0x0, {}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0xc, 0x6e, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}]}, 0x20}}, 0x0) r4 = gettid() tkill(r4, 0x3c) 14:40:20 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x34b}, {0x0}, {0x0}, {&(0x7f00000005c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57f45a0788e3aba04551e4735459205aa5a54a1a23806b69eaa522e15c7ce71553059a5ef83c2ab06a52fcfce7c467c7e6260464a4770e41f0fa8ae7891e20e1780931f3faf450b02b83048c1a9efa4a7c790000cbdd7bcd17db6d80a0b70ce886da58743a43df1059f6ef39a8b6fa457751e4e39d8b5f20df8c3da9e98b6410", 0x146}], 0x4, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0xc0, 0x0, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x3c, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @rand_addr="16f8bcd383af9b1577def13edad6b8bf"}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}]}, @CTA_TUPLE_REPLY={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x14, 0x4, @mcast1}}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x2c, 0x6, [@CTA_NAT_V6_MINIP={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @local}]}]}, 0xc0}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x3, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:40:20 executing program 1: mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000000280)='./bus\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setxattr$security_capability(&(0x7f0000000340)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000240)=@v3, 0x18, 0x0) [ 226.444257][T10431] ptrace attach of "/root/syz-executor.3"[10428] was attempted by "/root/syz-executor.3"[10431] 14:40:20 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, 0x0, &(0x7f0000001000)) 14:40:20 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3e, 0x0, &(0x7f0000001000)) 14:40:20 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x1d, 0x0, &(0x7f0000001000)) 14:40:20 executing program 1: rt_sigaction(0x1, &(0x7f0000000240)={&(0x7f00000001c0)="c4615c550d30fcea203ef2afc4c1be5eaae19600006766400f38db0a3e652e660f3822701a46f73506000000c4417e126ce09966440f289700000000c4c27d19a45100000081436b230f", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 14:40:20 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x42, 0x0, &(0x7f0000001000)) 14:40:20 executing program 0: 14:40:20 executing program 3: 14:40:20 executing program 4: 14:40:21 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006fc0)=[{{0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000002e80)=""/137, 0x89}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x259, 0x36) 14:40:21 executing program 5: creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x400) readv(0xffffffffffffffff, 0x0, 0x0) 14:40:21 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x4c, 0x0, &(0x7f0000001000)) 14:40:21 executing program 2: 14:40:21 executing program 4: 14:40:21 executing program 1: 14:40:21 executing program 3: 14:40:21 executing program 2: 14:40:21 executing program 0: 14:40:21 executing program 5: 14:40:21 executing program 4: 14:40:21 executing program 1: 14:40:21 executing program 4: 14:40:21 executing program 5: 14:40:21 executing program 3: 14:40:21 executing program 0: 14:40:21 executing program 2: 14:40:21 executing program 1: 14:40:21 executing program 4: 14:40:21 executing program 3: 14:40:21 executing program 2: 14:40:21 executing program 5: 14:40:21 executing program 0: 14:40:22 executing program 4: 14:40:22 executing program 1: 14:40:22 executing program 3: 14:40:22 executing program 2: 14:40:22 executing program 0: 14:40:22 executing program 4: 14:40:22 executing program 5: 14:40:22 executing program 3: 14:40:22 executing program 1: 14:40:22 executing program 2: 14:40:22 executing program 4: 14:40:22 executing program 5: 14:40:22 executing program 0: 14:40:22 executing program 1: 14:40:22 executing program 2: 14:40:22 executing program 3: 14:40:22 executing program 4: 14:40:22 executing program 0: 14:40:22 executing program 5: 14:40:22 executing program 3: 14:40:22 executing program 1: 14:40:23 executing program 2: 14:40:23 executing program 4: 14:40:23 executing program 5: 14:40:23 executing program 0: 14:40:23 executing program 1: 14:40:23 executing program 3: 14:40:23 executing program 4: 14:40:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xe, 0xe, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@call, @ldst={0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffff0, 0xfffffffffffffff4}, @jmp={0x5, 0x0, 0x0, 0x2, 0x2, 0x10, 0x4}, @initr0, @exit, @jmp={0x5, 0x1, 0x6, 0xa, 0xb, 0x100}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172d0275}, @map={0x18, 0xa}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4}, 0x10}, 0x78) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000280)={'veth0_to_bridge\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac141431e8", 0x0, 0x9}, 0x28) 14:40:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2e00000027000523a4abd32b8018007a0224fc60100002400a000200053582c137153e370900018003001700d1bd", 0x2e}], 0x1}, 0x0) 14:40:23 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x40107446, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, 0x0) 14:40:23 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x40107446, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x4, &(0x7f0000000000)='&@[\x00', 0xffffffffffffffff}, 0x30) 14:40:23 executing program 3: 14:40:23 executing program 4: 14:40:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x15, &(0x7f0000000200), 0x4) 14:40:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000001c00), 0x16}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000200), 0xffffffffffffff88) 14:40:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff0005da, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141423e0", 0x0, 0x9}, 0x28) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 14:40:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x8, &(0x7f0000000040)=r0, 0x52d) 14:40:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x17, &(0x7f0000000200)=r2, 0x4) 14:40:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141423e0", 0x0, 0x9}, 0x28) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 14:40:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x17, &(0x7f0000000200)=r2, 0x4) 14:40:23 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="2e00000032000502d25a80648c6356c10424fc000c0000000a000a00053582c1b0acea8b09000180feff0000d1bd", 0xc0}], 0x1}, 0x0) 14:40:24 executing program 3: gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x28}, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040)=r0, 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) 14:40:24 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) close(r1) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0xc004743e, &(0x7f0000000680)='&@[\x00') 14:40:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x2, 0x9, 0xfffffff9}, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x5}}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) perf_event_open(&(0x7f00000006c0)={0x1, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffffe}, 0x0, 0x0, 0x6}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000340)='!\xa0'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r1, 0x0, 0x7, &(0x7f0000000080)='vmnet1\x00'}, 0x30) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x38, 0x0, 0x7, 0xff, 0x0, 0x0, 0x800, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000100), 0x8}, 0x100, 0x0, 0x8, 0x1, 0x2, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0xc004743e, &(0x7f0000000680)='&@[\x00') 14:40:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac141423e0", 0x0, 0x9}, 0x28) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 14:40:24 executing program 5: [ 229.955642][T10624] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 229.996879][T10624] openvswitch: netlink: Message has 5 unknown bytes. [ 230.050569][T10630] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 230.111821][T10630] openvswitch: netlink: Message has 5 unknown bytes. 14:40:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f00000004c0)=0x4000) close(r1) 14:40:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xff000000, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631177fbac141423e0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 14:40:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x7, &(0x7f0000000200)=r2, 0x4) 14:40:24 executing program 2: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80, 0x0}, 0x20004040) 14:40:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="2e00000032000502d25a80648c6356c10424fc000c0000000a000a00053582c1b0acea8b09000180feff0000d1bd", 0xc0}], 0x1}, 0x0) 14:40:24 executing program 4: socket(0x18, 0x1, 0x0) getpgid(0x0) r0 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1, 0x3, 0x0) msgctl$IPC_SET(r0, 0x1, 0xfffffffffffffffe) msgsnd(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000000000000000e27eb7ba166bb505b358b8b724a1087b37064194c070237d7fcb5d201dafb80c7acb30d7100108000000a67815dd92248a9cf21b5aa400d13522440a0f8c12ed16e9471e30fa4780be4a5ec45a3be586b8d8523564dccd2b74835e0189b9c15826abf1aed96b8ffb9870462e796c9fb64b359f7d8cd8a7e75e2fdad2c6dd7b9ce23b8581bd8809166adefcc12c77ea83a7ab4383c61355bee7033c5e008c7987c0544e3f232c0124d14cc10fe25c7881c596bea37d4b6fc651b32d7ef7c433905cdd8c2b3a54be7cdf713764c67ef76578ba2c43e1f100"/235], 0xeb, 0x800) socket(0x18, 0x400000001002, 0x0) 14:40:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socket(0x1, 0x0, 0x0) r1 = socket(0x2, 0x2, 0x0) connect$unix(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x10) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = dup(r0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, &(0x7f0000000200)) sendto$inet6(r2, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) 14:40:24 executing program 2: r0 = socket(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000180)=0x5, 0x4) r1 = socket(0x2, 0x4003, 0x0) setsockopt(r1, 0x0, 0x7, &(0x7f0000000140)="01003f8a", 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket(0x2, 0xc003, 0x0) connect$unix(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="8202adfdffffffffffff3f7b238bf468d20d8a0a197a386207000000008295955984c87910bf093f68c11700287ead4bcb775ca69dfceac2a84e6abca64896819f507d0000000000002951b15801360bcd4c0a162b58fd4237b8fa4d012ae447473c220495aaee48c02f6ac41e6bf3bf554799000000ed52beb85a85f8b2fd57d60f13ad30505e8f5300a4aeef9d612f871f4385f04157795ea4a5c5fe659fa202361cd8cac7ecbc5b65c6593d2870b41200003500000000d28418ac1b00000000029cc4ac3908ddba44fb4b75550000000000000000000000df28d208000000000000006b47b8d7da4333ac0f994166518bed2e1977bd035f5ea1b1009e5a319d54401cb92f77420eea4173d5b6913eef9e8b0fb636710000d2df0ac87e0d7b65b7240cf97d03126da536ef612e9e3b79f7424082bec304ee9a498252abb7cc8e0cd938965d10374c4fea0ee6f28c35bb0edb267ae65c7d44a95bac417e2ab04fd8a9c98e958ff55d090000000000000036d11b2434c929b34b0087cf25dd9e1e49f931a4193897b0a30000cbf637786819bf7e26863a111574bd1b6d85eac8a829bf8aa02ae50c88910a9f37f502de8d7ff9f49d884ee2cf3725b1a0581adf2ea95d000000000000f145c4e68bfa8bfccf6a2c9ce08a146ee556cff99645d300682b4e970f01b899f51da0ff8237ed6b5ad30d7b696378a27e42cfc93123b8284e6b47e3f7dc2a8bcc719fe6682881ea2fd58ed735230fb7146a26ab3d3f3708e2029d36d56bf5f227030446137813494ae280cccf9136"], 0x10) dup2(r3, r2) setsockopt$sock_int(r2, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r4 = dup(r2) sendto$inet6(r4, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) 14:40:24 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) ftruncate(r0, 0x0) [ 230.539901][T10665] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 230.571866][T10665] openvswitch: netlink: Message has 5 unknown bytes. 14:40:24 executing program 5: mknod(&(0x7f00000013c0)='./bus\x00', 0x80008005, 0x516) open(&(0x7f00000000c0)='./bus\x00', 0x10005, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) [ 230.590066][T10670] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 230.609155][T10670] openvswitch: netlink: Message has 5 unknown bytes. 14:40:24 executing program 3: munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4) 14:40:24 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0xb, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xff64, 0x0}, 0xffffffffffffff36) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r1, &(0x7f00000001c0), 0x0}, 0x20) 14:40:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040), 0x1c) 14:40:24 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) unlink(0x0) 14:40:25 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0xc003, 0x0) connect$unix(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10) dup2(r1, r0) r2 = dup(r0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 14:40:25 executing program 0: poll(0x0, 0x0, 0x33b) 14:40:25 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6a8bc9634e19769bbd73"], 0x10) [ 231.110275][T10699] device bridge2 entered promiscuous mode [ 231.222482][T10701] device bridge1 entered promiscuous mode 14:40:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x2000080001, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000)={0xfff}, 0x8) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x34000}], 0x1}, 0x0) 14:40:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x24f680, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 14:40:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f000014e000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) 14:40:25 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0xb, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xff64, 0x0}, 0xffffffffffffff36) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 231.282410][T10701] hsr1: Slave B (bridge1) is not up; please bring it up to get a fully working HSR network [ 231.294515][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr1: link becomes ready 14:40:25 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioprio_get$uid(0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x34000}], 0x1}, 0x0) 14:40:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/313], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) 14:40:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_procfs(0x0, &(0x7f00000003c0)='net/psched\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) close(0xffffffffffffffff) close(0xffffffffffffffff) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0xaf02, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) 14:40:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/313], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x1}, 0x8, 0x10, 0x0}, 0x78) 14:40:25 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) unlink(0x0) 14:40:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffffff80000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) write$dsp(r0, &(0x7f0000000040)="5aec487ef707f070ba5a44b23d2410e78f63ab21ce30ca76cbbf68a5ba8a9adcfb5f9349540d8af3b862452a6c5422dd0f7f113d52228fe1b9f66ae81606c7", 0x3f) timerfd_create(0x0, 0x0) getpgid(0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0xa, 0xd}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}}, 0x0) [ 231.909027][T10749] bridge0: port 3(ipvlan1) entered blocking state [ 231.928792][T10749] bridge0: port 3(ipvlan1) entered disabled state 14:40:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={0x0, 0x0, 0x0}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/313], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) 14:40:26 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) close(r0) 14:40:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) close(0xffffffffffffffff) close(0xffffffffffffffff) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0xaf02, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 14:40:26 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000000)={@link_local, @broadcast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @remote, @link_local, @loopback}}}}, 0x0) [ 232.062246][T10756] device bridge4 entered promiscuous mode 14:40:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x404880, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000340), 0xfef5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x80, 0x10, 0xffffff1f, 0x70bd26, 0x0, {}, [@IFLA_LINKINFO={0x58, 0x12, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0x48, 0x2, [@gre_common_policy=[@IFLA_GRE_FWMARK={0x8, 0x14, 0xc323}, @IFLA_GRE_TTL={0x5, 0x8, 0x8}, @IFLA_GRE_LINK={0x8}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0xbf}, @IFLA_GRE_ENCAP_TYPE={0x6, 0xe, 0x2}], @gre_common_policy=[@IFLA_GRE_LINK={0x8}], @IFLA_GRE_REMOTE={0x14, 0x7, @dev}]}}}, @IFLA_MASTER={0x8}]}, 0x80}}, 0x0) 14:40:26 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000880)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\x05\x00\x00\x00\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\xfd\xbf\xe8LG\xfa\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArBZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\x15\x9c\xac\xe8\xfa^9') pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000200)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\x00\xfb\xaad\x1a\xa0') 14:40:26 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x101402, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0xc0, 0x0, 0x0, 0x0, @time={0x0, 0xffffffff}, {}, {}, @raw32}], 0x1c) 14:40:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) close(0xffffffffffffffff) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0xaf02, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 14:40:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/313], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) [ 232.312413][T10756] device bridge3 entered promiscuous mode [ 232.352469][T10756] hsr2: Slave B (bridge3) is not up; please bring it up to get a fully working HSR network [ 232.409084][ T2891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr2: link becomes ready 14:40:26 executing program 0: 14:40:26 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) unlink(0x0) 14:40:26 executing program 1: 14:40:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{0x0, 0x0, &(0x7f0000000dc0)}], 0x1, 0x0) 14:40:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='mountinfo\x00') read(r0, 0x0, 0x0) 14:40:26 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x0, 0x0, [], [{0x801, 0x0, 0x3988}, {0x801}]}) 14:40:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x7, 0x0, &(0x7f0000000040)=0x3f) 14:40:27 executing program 4: 14:40:27 executing program 2: 14:40:27 executing program 0: [ 233.002682][T10813] device bridge6 entered promiscuous mode 14:40:27 executing program 3: 14:40:27 executing program 4: 14:40:27 executing program 1: [ 233.193110][T10825] device bridge5 entered promiscuous mode [ 233.272173][T10825] hsr3: Slave B (bridge5) is not up; please bring it up to get a fully working HSR network [ 233.311113][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr3: link becomes ready 14:40:27 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) unlink(0x0) 14:40:27 executing program 0: 14:40:27 executing program 2: 14:40:27 executing program 4: 14:40:27 executing program 3: 14:40:27 executing program 1: 14:40:27 executing program 3: 14:40:27 executing program 1: bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpu.stat\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004ec0)={0xffffffffffffffff, 0xc0, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004d00), 0x0, 0x0, 0x0, &(0x7f0000004d80), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x1ff) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)) socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000080)}, {&(0x7f0000000840)}, {0x0}, {&(0x7f0000000500)="8dc46fdac491d056f30e5298de6fbdffcd10e5150fb1f2668b6e2ade21a61db2861c02113d929817a54b131c21a437e1d4f187185bb508fd1646a2ee3b505812b0f035b564f23884b5", 0x49}, {&(0x7f0000001840)}, {0x0}, {&(0x7f0000000640)="bb833996c7fb25c9c57cd6dfa0da3c9b2374f84e107fc3d855745ccd997f217bcdf84546a68f4f8dd988bd58f951e543f04fe8e41d49e51c80d1688383c7683774309ae5d86c1df8a724012fd28a", 0x4e}, {&(0x7f0000000700)="71f1e0b3a6b35ab66a016811d31fcdb643c79408c42d6993ff7dc36cc2ce89914e3952174322df05da01e70ffc25aefce87c", 0x32}], 0x8}, 0x8b) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x11, 0x200000000000002, 0x300) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004c00)={0x0, 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x400c00) r4 = openat$cgroup_ro(r3, &(0x7f0000000240)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x5) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="533e1e9dda657e7d"], 0x8) 14:40:27 executing program 4: 14:40:27 executing program 2: 14:40:27 executing program 0: 14:40:27 executing program 2: [ 233.916251][T10854] device bridge8 entered promiscuous mode [ 234.102386][T10854] device bridge7 entered promiscuous mode [ 234.142082][T10854] hsr4: Slave B (bridge7) is not up; please bring it up to get a fully working HSR network 14:40:28 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) 14:40:28 executing program 4: 14:40:28 executing program 3: 14:40:28 executing program 0: 14:40:28 executing program 2: 14:40:28 executing program 1: [ 234.154980][ T2890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr4: link becomes ready 14:40:28 executing program 4: 14:40:28 executing program 3: 14:40:28 executing program 1: 14:40:28 executing program 2: 14:40:28 executing program 0: 14:40:28 executing program 2: [ 234.558363][T10880] device bridge10 entered promiscuous mode [ 234.712583][T10886] device bridge9 entered promiscuous mode [ 234.752343][T10886] hsr5: Slave B (bridge9) is not up; please bring it up to get a fully working HSR network 14:40:28 executing program 3: 14:40:28 executing program 1: 14:40:28 executing program 4: 14:40:28 executing program 0: 14:40:28 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:28 executing program 2: [ 234.766350][ T2723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr5: link becomes ready 14:40:29 executing program 4: 14:40:29 executing program 1: 14:40:29 executing program 2: 14:40:29 executing program 0: 14:40:29 executing program 3: 14:40:29 executing program 0: [ 235.059022][T10900] device bridge12 entered promiscuous mode 14:40:29 executing program 4: [ 235.209283][T10905] device bridge11 entered promiscuous mode 14:40:29 executing program 0: [ 235.273155][T10905] hsr6: Slave B (bridge11) is not up; please bring it up to get a fully working HSR network 14:40:29 executing program 4: 14:40:29 executing program 3: 14:40:29 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:29 executing program 1: [ 235.334408][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr6: link becomes ready 14:40:29 executing program 2: 14:40:29 executing program 0: 14:40:29 executing program 1: 14:40:29 executing program 4: 14:40:29 executing program 3: 14:40:29 executing program 2: 14:40:29 executing program 0: 14:40:29 executing program 1: 14:40:30 executing program 4: 14:40:30 executing program 3: [ 235.849550][T10930] device bridge14 entered promiscuous mode [ 236.012633][T10930] device bridge13 entered promiscuous mode [ 236.072234][T10930] hsr7: Slave B (bridge13) is not up; please bring it up to get a fully working HSR network [ 236.123313][ T2891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr7: link becomes ready 14:40:30 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x0, 0x0) 14:40:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) 14:40:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x200009ee, &(0x7f0000000dc0), 0x8f, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 14:40:30 executing program 4: unshare(0x400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556b, 0x300) 14:40:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@newlink={0x34, 0x10, 0x70d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @cfhsi={{0xa, 0x1, 'cfhsi\x00'}, {0x4}}}]}, 0x34}}, 0x0) 14:40:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 14:40:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r0, 0x0, 0x15, 0x0, &(0x7f00000001c0)) 14:40:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r0, 0x0, 0xc, 0x0, &(0x7f00000001c0)) 14:40:30 executing program 2: bind$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r2, 0x0, 0x1, "c3"}, 0x9) 14:40:30 executing program 1: unshare(0x400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) [ 236.674763][T10975] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops 14:40:30 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newlink={0x4c, 0x10, 0x43b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @bond={{0x9, 0x1, 'bond\x00'}, {0x1c, 0x2, [@IFLA_BOND_RESEND_IGMP={0x8}, @IFLA_BOND_FAIL_OVER_MAC={0x5}, @IFLA_BOND_XMIT_HASH_POLICY={0x5}]}}}]}, 0x4c}}, 0x0) 14:40:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r0, 0x0, 0x29, 0x0, &(0x7f00000001c0)) 14:40:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:30 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @erspan={{0xb, 0x1, 'erspan\x00'}, {0x18, 0x2, [@gre_common_policy=[@IFLA_GRE_OKEY={0x8, 0x5, 0x6}], @gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}], @gre_common_policy=[@IFLA_GRE_ENCAP_TYPE={0x6}]]}}}]}, 0x48}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 14:40:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 237.016879][T11007] caif_hsicaif_hsi_newlink: failed to get the cfhsi_ops 14:40:31 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r0, 0x0, 0x19, 0x0, &(0x7f00000001c0)) 14:40:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xc}]}}, &(0x7f00000000c0)=""/236, 0x26, 0xec, 0x8}, 0x20) 14:40:31 executing program 2: unshare(0x400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556e, 0x300) 14:40:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:31 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010800000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0xfffffffe, 0x0, 0x11}, 0x98) sendmmsg$inet6(r0, &(0x7f0000002500)=[{{&(0x7f0000002840)={0xa, 0x0, 0x0, @ipv4={[0x2], [], @local}}, 0x1c, &(0x7f0000002a80)=[{&(0x7f0000000400)="a6", 0x1}], 0x1}}], 0x1, 0x0) 14:40:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 14:40:31 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) mmap(&(0x7f0000abb000/0x1000)=nil, 0x1000, 0x0, 0x102000200032, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x3d, &(0x7f0000abaff9)={0x77359400}, 0x8) 14:40:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="34000000100001000000000000000000000000000e0003006269746d61703a6970000000050005000000000005008b62d38c6175"], 0x34}}, 0x0) 14:40:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:31 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, 0x0, &(0x7f00000001c0)=0x4) 14:40:31 executing program 3: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'ipvlan0\x00'}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@mcast1, @in6=@local, 0x4e22, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, r1}, {0x0, 0x7fff, 0x0, 0x101, 0x0, 0x1f}}, {{@in=@dev={0xac, 0x14, 0x14, 0x10}}, 0x0, @in=@loopback, 0x0, 0x0, 0x1, 0x9, 0x8002, 0x6, 0x400}}, 0xe8) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe}, 0x0, 0x0, 0xffffffffffffffff, 0x8) gettid() clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0x4, &(0x7f0000000180), 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='veth1_to_hsr\x00', 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000001900)="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", 0x5ae}], 0x1}, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280)={0x20}, 0x4) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)) execve(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) getpid() ioctl$int_out(r0, 0x2, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x40000, 0x0) r3 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r3, 0x0, 0x0, &(0x7f0000000180)=0x4c4, 0x4) sendto$unix(r3, 0x0, 0x0, 0x8002, &(0x7f0000000040)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) sendmsg$unix(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001900)="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", 0x50c}], 0x1}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x10002) shutdown(r4, 0x0) 14:40:31 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000001780)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x2, {0x1, @raw_data="7c8601da29ef0a0b76fb6e417e3e1258adf963d232308a9feddfc7adfecaedfe27e9e414899507f63032545ffd25b385a3f299a8f2ce0f3b529d318c7feec75b54d0b67156316ecbd7b6d5c36313434e47ef7b2588c1425aadf73a3d2a87d3ed1fa6928d0f8b01e359cf1b69bfa933c0a2dc5893f05b72b15d5fd638b993d440cdf1d75bfe88f3d5c96de19bd336081055a9fb8eded63dba89d4f14e401aa68910d3c0cb85e3918a656ffa0400d942b420ed0feb9edd20e1d3b7dd1030a637433675b809a65800"}}) 14:40:32 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 14:40:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 237.941465][T11058] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! [ 238.119125][T11068] device bridge19 entered promiscuous mode 14:40:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0xa02000000000000, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000400000004000000c8030000000000000000000000000000e0020000e0020000e002000004000000000000000000000002"], 0x1) 14:40:32 executing program 4: unshare(0x400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x40049409, 0x10) 14:40:32 executing program 1: unshare(0x400) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) pwrite64(r0, 0x0, 0x46, 0x0) 14:40:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:32 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(r0, 0x0, 0x13, 0x0, &(0x7f00000001c0)) 14:40:32 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '/dev/uinput\x00'}, 0x0, 0x0, 0x0) 14:40:32 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 14:40:32 executing program 4: r0 = fanotify_init(0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r1) fanotify_mark(r0, 0x51, 0x8000038, r2, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) 14:40:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)={{0x14}, [@NFT_MSG_NEWTABLE={0x14}, @NFT_MSG_NEWCHAIN={0x4c, 0x3, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x88}}, 0x0) 14:40:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000008c0)="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", 0xfc) 14:40:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) flistxattr(r1, &(0x7f0000000100)=""/206, 0xce) [ 238.649923][T11108] netlink: 'syz-executor.1': attribute type 28 has an invalid length. [ 238.669986][T11100] device bridge21 entered promiscuous mode [ 238.683454][T11108] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 14:40:32 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:32 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0xa}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004beafd0d4f020a8447000b4e230f00000000a2bc5603ca00000f7f890000002000000001d29d0d3869e3921853dbdcffdb0000000309ff5bffff00c7e5ed", 0x48}], 0x1) 14:40:32 executing program 3: syz_open_dev$vcsn(0x0, 0x0, 0x98501) write$eventfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 14:40:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x3, 0x61, [], 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f00000000c0)=""/97}, &(0x7f0000000180)=0x78) close(r2) 14:40:33 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x1007, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000000)={0x1, 0x2}) 14:40:33 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 14:40:33 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:33 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mremap(&(0x7f00003c5000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000143000/0x1000)=nil) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 14:40:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'\x00', 0x102}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'ip6_vti0\x00', 0x400}) dup2(r4, r3) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'\x00', 0x102}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000000)={'ip6_vti0\x00', 0x400}) dup2(r6, r5) ioctl$DRM_IOCTL_GEM_FLINK(r6, 0xc008640a, &(0x7f0000000000)) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)) sendfile(r1, r2, 0x0, 0x2000005) dup3(r0, r1, 0x0) [ 239.216409][T11139] device bridge23 entered promiscuous mode 14:40:33 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, 0x0) close(r2) 14:40:33 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:33 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:33 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:33 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:33 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000002374d027c9ed94090500000130a8a8e9d67c"], 0x16) [ 239.682887][T11173] device bridge25 entered promiscuous mode 14:40:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x3, 0x61, [], 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f00000000c0)=""/97}, &(0x7f0000000180)=0x78) close(r2) 14:40:34 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000380)="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", 0x1f5}], 0x1, 0xb) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa20d7beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a016dd0fa49bebf7a08c305bee6fd6"}) 14:40:34 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:34 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:34 executing program 3: mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x8000000000c, 0x71, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xc, 0x0, &(0x7f0000000040)) [ 240.226138][T11193] device bridge27 entered promiscuous mode 14:40:34 executing program 2: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'ip6_vti0\x00', 0x400}) pipe(0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) 14:40:34 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:34 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:34 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x12, 0x0, 0x0, "f04a82706694a7d154c629f75b71a95a8f3b289271c607adb22d4d534f4cf29cff0359ad514d3aa2057beebc689ab001521f48dc57122f1b38e9e8af694c0d43", "d66ee438c04045ff21d735bd90f8c3e2c4a0161511a49beb200700"}) 14:40:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x0, 0x8, 0x101002, 0xffffffffffffffff, 0x0, &(0x7f0000000640)={0xa00966, 0x80000bc0, [], @value=0x9}}) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x26, 0x803, 0x1) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x19d) r5 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f0000000100)={0x1}) r6 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r6, 0xc02c563a, &(0x7f0000000100)={0x1}) r7 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_CROPCAP(r7, 0xc02c563a, &(0x7f0000000100)={0x1}) sendmsg$nl_route(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRES64=r5, @ANYBLOB="c16a44429c6d2b4f8192c129b020aab5741b6a04a14f145582d560facc70c5be988e00d81063a979ab8097d025ae9af2b271c9cb3cf07dbdcf22bbfdf3baacd2dff91b37df714185384b238305b3ea231905cd3923025675d376167b04f49c2508f699e0d0a84229bb1c", @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESHEX=r1], @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES32=r6, @ANYRESDEC, @ANYRESHEX=r7]], @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x3}}, 0x0) r8 = socket(0x200000000000011, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(r8, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_MASTER={0x8, 0xa, r13}]}, 0x28}}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 14:40:34 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 240.849541][T11216] device bridge_slave_0 left promiscuous mode [ 240.858416][T11216] bridge0: port 1(bridge_slave_0) entered disabled state 14:40:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) close(0xffffffffffffffff) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) [ 240.959657][T11226] device bridge29 entered promiscuous mode [ 241.031530][T11235] kAFS: Bad value for 'source' [ 241.048538][T11216] syz-executor.1 (11216) used greatest stack depth: 22824 bytes left 14:40:35 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:35 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x0, 0x8, 0x101002, 0xffffffffffffffff, 0x0, &(0x7f0000000640)={0xa00966, 0x80000bc0, [], @value=0x9}}) r0 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x26, 0x803, 0x1) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x19d) r5 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f0000000100)={0x1}) r6 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r6, 0xc02c563a, &(0x7f0000000100)={0x1}) r7 = syz_open_dev$video(&(0x7f0000000340)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_CROPCAP(r7, 0xc02c563a, &(0x7f0000000100)={0x1}) sendmsg$nl_route(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRES64=r5, @ANYBLOB="c16a44429c6d2b4f8192c129b020aab5741b6a04a14f145582d560facc70c5be988e00d81063a979ab8097d025ae9af2b271c9cb3cf07dbdcf22bbfdf3baacd2dff91b37df714185384b238305b3ea231905cd3923025675d376167b04f49c2508f699e0d0a84229bb1c", @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESHEX=r1], @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES32=r6, @ANYRESDEC, @ANYRESHEX=r7]], @ANYRES32=r4, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x3}}, 0x0) r8 = socket(0x200000000000011, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getsockname$packet(r8, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_MASTER={0x8, 0xa, r13}]}, 0x28}}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 14:40:35 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 241.243917][T11247] kAFS: Bad value for 'source' [ 241.429649][T11255] device bridge31 entered promiscuous mode 14:40:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$sock(r5, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000840)="f46cbd20fd4b1cbce1a13485b90f59ea6f6ff7d1d49d49638713fdb1f9948a1c0b6f3fe3d61a2acf22d1366859278aeff3d7877b013f83663b0b10f2a41ede88514b50e870f171bf281675932c38887237a754b1bd142f633071c6621340274ad26fec3bca58a92c7a867327e91084834ea6e49a916be86a997789b25ceec3a9ff834cf36c1ffc120777c2f6d1216b5b23985b4d7df305bf6cdf43cc3b319f76429b45aa7ce56ebeb46a5d2968b8abe4ec5436fdd6b685ce3c63ca248d995177ac0d4bdc074e70f32c4e750b11fb6a240e770da692e8015ee679bc9a3bf1a852b280f5f673ac8f9fe986ee48fb7aeb7062de7224aad9966d", 0xf8}, {&(0x7f0000000940)="c97bead89525da49a6e9e27830e41ac4aa53b96bf12be3495b331e23ee0c4747d34977d8bf41ab9f082d981f820fa784fd2274ad3944d71110286a211b65db461de7cd29323b", 0x46}, {&(0x7f00000009c0)="9a97b4714716eac6000e39ae06bb1893e3abdb1c3bc5439ded8ec8258984d920fd5c16aa0e08751b24f01dfbe9739d021138fe06f497c78c21c8c2aeb603c16ad31d42ed3f239652eced63555f131fba39d3cb2bac97a366e5b3aacf5705ae4ae9bfece85d6c15f38cf83738cbd3d0648ceb04dceb7d968e12f6be4a7cf42dcaf8fc9ec5a4c44ce73338ead1d78e9054becf951dd58c56d458f90d69dad1bea60ac98f3ffc14fd9d7d0b984911e3d4e82eb41ec3236ac6f6460e4fb7", 0xbc}, {&(0x7f0000000a80)="8b392db9b7a4ffb8f4184472a38d4021e56db1c33c4b2b363aa62702ccc4c13a65eca09d69ea4a69debbb41b0862798f28174adb11b105f136e0410359c1f3cc0e1eebe2490039a3806968aaefe814e21ed9596058b3450a5784210b84cbc39cbac76865ea762634b394bf62656fed0bed1daf55aa352b13e45b08c63726b9956e3879922591e38b9f149cca01321d3ecc7bc5c261cbc774e2a2d45e54c61f", 0x9f}, {&(0x7f0000000b40)="cc0004b41ece4bba9770befebb3520104bd32c10a73f84e0c8c28fe2f74d57d8b3d514616ecb3d72ad882932e78da5", 0x2f}], 0x6}, 0x0) 14:40:35 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) close(0xffffffffffffffff) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340), 0x106}}, 0x20) 14:40:35 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:35 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:35 executing program 1: getpid() sched_setscheduler(0x0, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000002c0)={0x6, 'virt_wifi0\x00'}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x5, 0x2b, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40046f41, &(0x7f0000000100)={r4, 0x7000002}) ppoll(&(0x7f00000000c0)=[{}], 0x20000000000000c3, 0x0, 0x0, 0xffffffffffffff34) [ 241.772281][T11267] kAFS: Bad value for 'source' 14:40:36 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x80\x00\x00\x00\x00\xfa\xfc\xe6s\x89\x9b', 0x0) pwritev(r1, 0x0, 0x0, 0x81808) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000002ec0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x5, 0x0, 0x8, 0x47}, &(0x7f0000000380)=0x98) sendfile(r0, r0, 0x0, 0x3f000000) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 242.016381][T11279] device bridge33 entered promiscuous mode 14:40:36 executing program 1: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x0) listen(r1, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 242.083432][T11287] kAFS: Bad value for 'source' 14:40:36 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:36 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 242.343151][T11301] kAFS: Bad value for 'source' 14:40:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x80\x00\x00\x00\x00\xfa\xfc\xe6s\x89\x9b', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)="be2f402056980532d29917e8faf48fc7871f57529191e0fe02da766293874ef3122d13a03c6e4daf13b8c473e0f0f238e20d7a45cf4a27840db0", 0x3a}], 0x1, 0x81808) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000002ec0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r3, 0x8, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x5, 0x0, 0x8, 0x47}, &(0x7f0000000380)=0x98) sendfile(r0, r0, 0x0, 0x3f000000) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000005c0)={0x0, 0xfb, 0x81, 0x2, 0x0, "8ef78f44285d2d9caa5b5cb9caa07b12", "6b050a212b6173cb671a9b22feffe815a995b72e232e4ccd621213bbd649e308747835ffcf09e33129a1499151253914970ad2390e70a418b838f2e538fa4453a7cb4a40ed9931e1f1afcf78f4a4718fa4adb0d0ea4ba54d9aa0f899ea79f2fde33f9af3a069855879094086"}, 0x81, 0x1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 14:40:36 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:36 executing program 3: [ 242.592024][T11311] kAFS: Bad value for 'source' 14:40:36 executing program 3: [ 242.707580][T11310] device bridge35 entered promiscuous mode [ 242.744051][T11313] blk_update_request: I/O error, dev loop0, sector 72 op 0x0:(READ) flags 0x80700 phys_seg 6 prio class 0 14:40:36 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:36 executing program 3: [ 242.823949][ T2620] blk_update_request: I/O error, dev loop0, sector 72 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 242.872721][ T2620] Buffer I/O error on dev loop0, logical block 9, async page read 14:40:37 executing program 3: 14:40:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) 14:40:37 executing program 1: 14:40:37 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x80\x00\x00\x00\x00\xfa\xfc\xe6s\x89\x9b', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)="be2f402056980532d29917e8faf48fc7871f57529191e0fe02da766293874ef3122d13a03c6e4daf13b8c473e0f0f238e20d7a45cf4a27840db0", 0x3a}], 0x1, 0x81808) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000002ec0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r3, 0x8, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x5, 0x0, 0x8, 0x47}, &(0x7f0000000380)=0x98) sendfile(r0, r0, 0x0, 0x3f000000) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000005c0)={0x0, 0xfb, 0x81, 0x2, 0x0, "8ef78f44285d2d9caa5b5cb9caa07b12", "6b050a212b6173cb671a9b22feffe815a995b72e232e4ccd621213bbd649e308747835ffcf09e33129a1499151253914970ad2390e70a418b838f2e538fa4453a7cb4a40ed9931e1f1afcf78f4a4718fa4adb0d0ea4ba54d9aa0f899ea79f2fde33f9af3a069855879094086"}, 0x81, 0x1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 14:40:37 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:37 executing program 3: 14:40:37 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:37 executing program 3: 14:40:37 executing program 3: 14:40:37 executing program 1: 14:40:37 executing program 3: 14:40:37 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) 14:40:37 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:37 executing program 1: 14:40:38 executing program 2: 14:40:38 executing program 3: 14:40:38 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:38 executing program 2: 14:40:38 executing program 3: 14:40:38 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:38 executing program 1: 14:40:38 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) 14:40:38 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:38 executing program 2: 14:40:38 executing program 3: 14:40:38 executing program 1: 14:40:38 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:38 executing program 3: 14:40:38 executing program 2: 14:40:38 executing program 1: 14:40:38 executing program 3: 14:40:38 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r1) 14:40:38 executing program 2: 14:40:38 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:39 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:39 executing program 1: 14:40:39 executing program 3: 14:40:39 executing program 2: 14:40:39 executing program 1: 14:40:39 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:39 executing program 3: 14:40:39 executing program 2: 14:40:39 executing program 1: [ 245.326968][T11435] device bridge39 entered promiscuous mode 14:40:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r1) 14:40:39 executing program 3: 14:40:39 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:39 executing program 1: 14:40:39 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:39 executing program 2: 14:40:39 executing program 3: 14:40:39 executing program 2: 14:40:40 executing program 1: [ 245.809285][T11456] device bridge40 entered promiscuous mode 14:40:40 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:40 executing program 3: 14:40:40 executing program 1: 14:40:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r1) 14:40:40 executing program 2: 14:40:40 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:40 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:40 executing program 3: 14:40:40 executing program 1: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) [ 246.707134][T11481] device bridge41 entered promiscuous mode 14:40:40 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:40 executing program 2: inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfec8) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000000c0)=',\x00', &(0x7f0000000100)='$%ppp0ppp0keyring!^nodevvboxnet1$self\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x2, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}, 0x20}}, 0x0) r3 = dup2(0xffffffffffffffff, r1) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f0000000040)={0x5, "c6afd63e479dd25d60217f47953a584155505ccad3715b1667e9d67e9ef686c6", 0x1}) 14:40:40 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:41 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2810, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x1, r0, &(0x7f00000001c0)="b342fb653227dc651de643f8c79002833c8e9e5f44cf017a3cbbba9dd2248adaf644a8352efdf7a97b695935f06194ea51cf3ca2d3b1ea02fdbfbb0a0bbf782becdc1b0cc432f2ecf2f385e005ab24ca390f543d766d459e7821a9bc8768d196b6f5e31a60cad36fb135b4f81848ec011dd28792a2161d63ffd83df593112f99ad40f5ad02986b3ad5dc20639a49b499894f355dee35f726aab29020cd50c8cd4948ae8378f5fd8148110a48ca8cbae70c30e202f9", 0xb5, 0xb5d, 0x0, 0x2}]) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xa0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200290804000000020000000400000008000c00"], 0x1c}, 0x1, 0xfdffffff00000000}, 0x0) 14:40:41 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 247.008669][T11493] device bridge2 entered promiscuous mode [ 247.142128][T11498] device bridge1 entered promiscuous mode [ 247.192624][T11498] debugfs: Directory 'hsr1' with parent 'hsr' already present! [ 247.202572][T11498] Cannot create hsr debugfs directory [ 247.213874][T11498] hsr1: Slave B (bridge1) is not up; please bring it up to get a fully working HSR network [ 247.261513][T11503] device bridge2 entered promiscuous mode [ 247.346814][T11506] device bridge1 entered promiscuous mode [ 247.393076][T11506] debugfs: Directory 'hsr1' with parent 'hsr' already present! [ 247.400687][T11506] Cannot create hsr debugfs directory [ 247.413354][T11506] hsr1: Slave B (bridge1) is not up; please bring it up to get a fully working HSR network [ 247.438789][T11513] device bridge43 entered promiscuous mode 14:40:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(0xffffffffffffffff) 14:40:41 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:41 executing program 1: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:41 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:41 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:41 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 247.615420][ T2890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr1: link becomes ready [ 247.635944][ T2890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr1: link becomes ready 14:40:41 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 247.911554][T11531] device bridge4 entered promiscuous mode 14:40:42 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:42 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 248.410069][T11532] device bridge4 entered promiscuous mode 14:40:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2810, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x1, r0, &(0x7f00000001c0)="b342fb653227dc651de643f8c79002833c8e9e5f44cf017a3cbbba9dd2248adaf644a8352efdf7a97b695935f06194ea51cf3ca2d3b1ea02fdbfbb0a0bbf782becdc1b0cc432f2ecf2f385e005ab24ca390f543d766d459e7821a9bc8768d196b6f5e31a60cad36fb135b4f81848ec011dd28792a2161d63ffd83df593112f99ad40f5ad02986b3ad5dc20639a49b499894f355dee35f726aab29020cd50c8cd4948ae8378f5fd8148110a48ca8cbae70c30e202f9", 0xb5, 0xb5d, 0x0, 0x2}]) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xa0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200290804000000020000000400000008000c00"], 0x1c}, 0x1, 0xfdffffff00000000}, 0x0) 14:40:43 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(0xffffffffffffffff) [ 249.082568][T11534] device bridge3 entered promiscuous mode [ 249.121706][T11534] debugfs: Directory 'hsr2' with parent 'hsr' already present! [ 249.149820][T11534] Cannot create hsr debugfs directory [ 249.174664][T11534] hsr2: Slave B (bridge3) is not up; please bring it up to get a fully working HSR network 14:40:43 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:43 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 250.496545][T11536] device bridge3 entered promiscuous mode 14:40:44 executing program 1: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:44 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 14:40:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(0xffffffffffffffff) [ 250.541901][T11536] debugfs: Directory 'hsr2' with parent 'hsr' already present! [ 250.549536][T11536] Cannot create hsr debugfs directory [ 250.572035][T11536] hsr2: Slave B (bridge3) is not up; please bring it up to get a fully working HSR network [ 250.638294][T11541] device bridge45 entered promiscuous mode 14:40:46 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:46 executing program 0 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:46 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r1) [ 252.219340][ T2891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr2: link becomes ready [ 252.238888][ T2891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr2: link becomes ready [ 252.277584][T11596] FAULT_INJECTION: forcing a failure. [ 252.277584][T11596] name failslab, interval 1, probability 0, space 0, times 1 [ 252.297587][T11568] device bridge6 entered promiscuous mode [ 252.325345][T11596] CPU: 0 PID: 11596 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 252.334067][T11596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.344353][T11596] Call Trace: [ 252.347655][T11596] dump_stack+0x197/0x210 [ 252.352141][T11596] should_fail.cold+0xa/0x15 [ 252.356859][T11596] ? fault_create_debugfs_attr+0x180/0x180 [ 252.362864][T11596] ? ___might_sleep+0x163/0x2c0 [ 252.367722][T11596] __should_failslab+0x121/0x190 [ 252.373196][T11596] should_failslab+0x9/0x14 [ 252.377714][T11596] __kmalloc_track_caller+0x2dc/0x760 [ 252.383089][T11596] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 252.389351][T11596] ? fput_many+0x12c/0x1a0 [ 252.393767][T11596] ? strndup_user+0x77/0xd0 [ 252.398385][T11596] memdup_user+0x26/0xd0 [ 252.402645][T11596] strndup_user+0x77/0xd0 [ 252.406976][T11596] copy_mount_string+0x2a/0x40 [ 252.411853][T11596] __ia32_compat_sys_mount+0xcf/0x790 [ 252.417254][T11596] ? trace_hardirqs_on+0x67/0x240 [ 252.422294][T11596] do_fast_syscall_32+0x27b/0xe16 [ 252.427423][T11596] entry_SYSENTER_compat+0x70/0x7f [ 252.432674][T11596] RIP: 0023:0xf7f1d9a9 [ 252.436744][T11596] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 252.456864][T11596] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 252.465296][T11596] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 252.473279][T11596] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 252.481303][T11596] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:40:46 executing program 0 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 252.489336][T11596] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 252.497306][T11596] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 252.576812][T11574] device bridge5 entered promiscuous mode [ 252.586740][T11602] FAULT_INJECTION: forcing a failure. [ 252.586740][T11602] name failslab, interval 1, probability 0, space 0, times 0 [ 252.600050][T11602] CPU: 0 PID: 11602 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 252.608725][T11602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.619110][T11602] Call Trace: [ 252.622493][T11602] dump_stack+0x197/0x210 [ 252.626879][T11602] should_fail.cold+0xa/0x15 [ 252.631479][T11602] ? fault_create_debugfs_attr+0x180/0x180 [ 252.637636][T11602] ? ___might_sleep+0x163/0x2c0 [ 252.642516][T11602] __should_failslab+0x121/0x190 [ 252.647521][T11602] should_failslab+0x9/0x14 [ 252.652210][T11602] __kmalloc_track_caller+0x2dc/0x760 [ 252.657605][T11602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.663986][T11602] ? strndup_user+0x77/0xd0 [ 252.668775][T11602] memdup_user+0x26/0xd0 [ 252.673137][T11602] strndup_user+0x77/0xd0 [ 252.677467][T11602] copy_mount_string+0x2a/0x40 [ 252.682263][T11602] __ia32_compat_sys_mount+0xfb/0x790 [ 252.687649][T11602] ? trace_hardirqs_on+0x67/0x240 [ 252.694388][T11602] do_fast_syscall_32+0x27b/0xe16 [ 252.699530][T11602] entry_SYSENTER_compat+0x70/0x7f [ 252.704828][T11602] RIP: 0023:0xf7f1d9a9 [ 252.709088][T11602] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 252.729220][T11602] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 252.737894][T11602] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 252.746081][T11602] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 252.754060][T11602] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 252.762325][T11602] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 252.770445][T11602] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 252.791890][T11574] debugfs: Directory 'hsr3' with parent 'hsr' already present! [ 252.799897][T11574] Cannot create hsr debugfs directory [ 252.806473][T11574] hsr3: Slave B (bridge5) is not up; please bring it up to get a fully working HSR network [ 252.840994][T11587] device bridge6 entered promiscuous mode [ 252.932658][T11588] device bridge5 entered promiscuous mode [ 252.961748][T11588] debugfs: Directory 'hsr3' with parent 'hsr' already present! [ 252.969578][T11588] Cannot create hsr debugfs directory [ 252.979536][T11588] hsr3: Slave B (bridge5) is not up; please bring it up to get a fully working HSR network 14:40:47 executing program 2: openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000380)={'filter\x00'}, &(0x7f0000000400)=0x44) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) r3 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r3, 0x11b, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x18) memfd_create(&(0x7f0000000780)='(\x00', 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r4, 0x0, r5, 0x0, 0x10005, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0185647, &(0x7f0000000240)={0xf000000, 0x40, 0xfffff800, r5, 0x0, &(0x7f0000000100)={0x990906, 0x0, [], @p_u8=&(0x7f0000000080)=0x5}}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r6, 0x4040534e, &(0x7f0000000280)={0x14, @time={0x1, 0xffffffff}, 0x3f, {0xff, 0x3f}, 0x40, 0x0, 0x80}) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0xd4, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_NODE={0x4}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8a0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr=0x700}}, 0x80, &(0x7f0000003b80), 0x2f2, &(0x7f0000003bc0)}}], 0x3a6, 0x0) 14:40:47 executing program 0 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:47 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:47 executing program 1: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 253.028500][T11598] device bridge47 entered promiscuous mode 14:40:47 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r1) [ 253.121521][T11609] FAULT_INJECTION: forcing a failure. [ 253.121521][T11609] name failslab, interval 1, probability 0, space 0, times 0 [ 253.187581][T11609] CPU: 0 PID: 11609 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 253.196563][T11609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.208489][T11609] Call Trace: [ 253.211916][T11609] dump_stack+0x197/0x210 [ 253.216379][T11609] should_fail.cold+0xa/0x15 [ 253.220997][T11609] ? __kasan_check_read+0x11/0x20 [ 253.226057][T11609] ? fault_create_debugfs_attr+0x180/0x180 [ 253.232012][T11609] ? ___might_sleep+0x163/0x2c0 [ 253.237060][T11609] __should_failslab+0x121/0x190 [ 253.242035][T11609] should_failslab+0x9/0x14 [ 253.246567][T11609] kmem_cache_alloc+0x2aa/0x710 [ 253.251766][T11609] ? find_held_lock+0x35/0x130 [ 253.256563][T11609] ? __might_fault+0x12b/0x1e0 [ 253.261453][T11609] getname_flags+0xd6/0x5b0 [ 253.266232][T11609] user_path_at_empty+0x2f/0x50 [ 253.271259][T11609] do_mount+0x150/0x1b50 [ 253.275534][T11609] ? copy_mount_string+0x40/0x40 [ 253.280501][T11609] ? _copy_from_user+0x12c/0x1a0 [ 253.285568][T11609] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 253.291835][T11609] ? memdup_user+0x80/0xd0 [ 253.296271][T11609] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 253.302627][T11609] ? copy_mount_options+0x2e8/0x3f0 [ 253.307962][T11609] __ia32_compat_sys_mount+0x664/0x790 [ 253.313564][T11609] ? trace_hardirqs_on+0x67/0x240 [ 253.318854][T11609] do_fast_syscall_32+0x27b/0xe16 [ 253.323914][T11609] entry_SYSENTER_compat+0x70/0x7f [ 253.329033][T11609] RIP: 0023:0xf7f1d9a9 [ 253.333117][T11609] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 253.353079][T11609] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 253.361505][T11609] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 253.369476][T11609] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 253.377490][T11609] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:40:47 executing program 0 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 253.385763][T11609] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 253.394262][T11609] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 253.468167][T11624] FAULT_INJECTION: forcing a failure. [ 253.468167][T11624] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 253.481442][T11624] CPU: 0 PID: 11624 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 253.490651][T11624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.501359][T11624] Call Trace: [ 253.504940][T11624] dump_stack+0x197/0x210 [ 253.509279][T11624] should_fail.cold+0xa/0x15 [ 253.514122][T11624] ? fault_create_debugfs_attr+0x180/0x180 [ 253.520047][T11624] ? __kasan_check_read+0x11/0x20 [ 253.525317][T11624] ? __lock_acquire+0x16f2/0x4a00 [ 253.530408][T11624] ? _parse_integer+0x190/0x190 [ 253.535568][T11624] should_fail_alloc_page+0x50/0x60 [ 253.541036][T11624] __alloc_pages_nodemask+0x1a1/0x910 [ 253.546581][T11624] ? fs_reclaim_release+0xf/0x30 [ 253.551538][T11624] ? __alloc_pages_slowpath+0x2900/0x2900 [ 253.557288][T11624] ? fs_reclaim_release+0xf/0x30 [ 253.562259][T11624] ? fault_create_debugfs_attr+0x180/0x180 [ 253.568101][T11624] cache_grow_begin+0x90/0xc60 [ 253.572979][T11624] ? getname_flags+0xd6/0x5b0 [ 253.577816][T11624] ? trace_hardirqs_off+0x62/0x240 [ 253.582969][T11624] kmem_cache_alloc+0x64e/0x710 [ 253.587833][T11624] ? find_held_lock+0x35/0x130 [ 253.592602][T11624] getname_flags+0xd6/0x5b0 [ 253.597126][T11624] user_path_at_empty+0x2f/0x50 [ 253.602021][T11624] do_mount+0x150/0x1b50 [ 253.606262][T11624] ? copy_mount_string+0x40/0x40 [ 253.611506][T11624] ? _copy_from_user+0x12c/0x1a0 [ 253.616553][T11624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 253.622812][T11624] ? memdup_user+0x80/0xd0 [ 253.627334][T11624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 253.633821][T11624] ? copy_mount_options+0x2e8/0x3f0 [ 253.639020][T11624] __ia32_compat_sys_mount+0x664/0x790 [ 253.644691][T11624] ? trace_hardirqs_on+0x67/0x240 [ 253.649727][T11624] do_fast_syscall_32+0x27b/0xe16 [ 253.654770][T11624] entry_SYSENTER_compat+0x70/0x7f [ 253.659891][T11624] RIP: 0023:0xf7f1d9a9 [ 253.663951][T11624] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 253.683550][T11624] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 253.692173][T11624] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 253.700170][T11624] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 253.708235][T11624] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:40:47 executing program 0 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 253.716371][T11624] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 253.724520][T11624] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:40:47 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) [ 253.782719][ T2890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr3: link becomes ready [ 253.790818][ T2890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr3: link becomes ready [ 253.817849][T11628] FAULT_INJECTION: forcing a failure. [ 253.817849][T11628] name failslab, interval 1, probability 0, space 0, times 0 [ 253.842790][T11628] CPU: 0 PID: 11628 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 253.851630][T11628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.861695][T11628] Call Trace: [ 253.865014][T11628] dump_stack+0x197/0x210 [ 253.869382][T11628] should_fail.cold+0xa/0x15 [ 253.874883][T11628] ? fault_create_debugfs_attr+0x180/0x180 [ 253.880722][T11628] ? ___might_sleep+0x163/0x2c0 [ 253.885702][T11628] __should_failslab+0x121/0x190 [ 253.890669][T11628] should_failslab+0x9/0x14 [ 253.895204][T11628] __kmalloc+0x2e0/0x770 [ 253.899605][T11628] ? save_stack+0x5c/0x90 [ 253.904085][T11628] ? tomoyo_encode2.part.0+0xf5/0x400 [ 253.909746][T11628] tomoyo_encode2.part.0+0xf5/0x400 [ 253.915078][T11628] ? do_fast_syscall_32+0x27b/0xe16 [ 253.920336][T11628] tomoyo_encode+0x2b/0x50 [ 253.924958][T11628] tomoyo_mount_acl+0xe0/0x840 [ 253.930210][T11628] ? debug_check_no_obj_freed+0x20a/0x43f [ 253.935944][T11628] ? __kasan_check_read+0x11/0x20 [ 253.940984][T11628] ? mark_lock+0xc2/0x1220 [ 253.945404][T11628] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 253.951094][T11628] ? __kasan_check_read+0x11/0x20 [ 253.956218][T11628] ? __lock_acquire+0x8a0/0x4a00 [ 253.961276][T11628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.967516][T11628] ? debug_smp_processor_id+0x33/0x18a [ 253.972990][T11628] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 253.979399][T11628] ? lock_acquire+0x190/0x410 [ 253.984170][T11628] ? tomoyo_mount_permission+0x10a/0x400 [ 253.990075][T11628] tomoyo_mount_permission+0x16a/0x400 [ 253.995677][T11628] ? tomoyo_mount_permission+0x10a/0x400 [ 254.001466][T11628] ? tomoyo_mount_acl+0x840/0x840 [ 254.006548][T11628] ? strncpy_from_user+0x2b4/0x400 [ 254.011678][T11628] tomoyo_sb_mount+0x35/0x40 [ 254.016291][T11628] security_sb_mount+0x87/0xd0 [ 254.021075][T11628] do_mount+0x1d4/0x1b50 [ 254.025558][T11628] ? copy_mount_string+0x40/0x40 [ 254.030592][T11628] ? _copy_from_user+0x12c/0x1a0 [ 254.035649][T11628] ? memdup_user+0x80/0xd0 14:40:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r1) [ 254.040182][T11628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 254.046566][T11628] ? copy_mount_options+0x2e8/0x3f0 [ 254.051794][T11628] __ia32_compat_sys_mount+0x664/0x790 [ 254.057422][T11628] ? trace_hardirqs_on+0x67/0x240 [ 254.062488][T11628] do_fast_syscall_32+0x27b/0xe16 [ 254.067929][T11628] entry_SYSENTER_compat+0x70/0x7f [ 254.073585][T11628] RIP: 0023:0xf7f1d9a9 [ 254.077814][T11628] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 254.098070][T11628] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 254.106591][T11628] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 254.114700][T11628] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 254.122684][T11628] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 254.130673][T11628] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 254.138662][T11628] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:40:48 executing program 0 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 254.257017][T11642] FAULT_INJECTION: forcing a failure. [ 254.257017][T11642] name failslab, interval 1, probability 0, space 0, times 0 [ 254.270175][T11642] CPU: 0 PID: 11642 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 254.278861][T11642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.289015][T11642] Call Trace: [ 254.292328][T11642] dump_stack+0x197/0x210 [ 254.296933][T11642] should_fail.cold+0xa/0x15 [ 254.301818][T11642] ? fault_create_debugfs_attr+0x180/0x180 [ 254.307656][T11642] ? ___might_sleep+0x163/0x2c0 [ 254.312628][T11642] __should_failslab+0x121/0x190 [ 254.317576][T11642] should_failslab+0x9/0x14 [ 254.322173][T11642] __kmalloc+0x2e0/0x770 [ 254.326438][T11642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.332829][T11642] ? d_absolute_path+0x11b/0x170 [ 254.337808][T11642] ? __d_path+0x140/0x140 [ 254.342357][T11642] ? tomoyo_encode2.part.0+0xf5/0x400 [ 254.347862][T11642] tomoyo_encode2.part.0+0xf5/0x400 [ 254.353072][T11642] tomoyo_encode+0x2b/0x50 [ 254.357577][T11642] tomoyo_realpath_from_path+0x19c/0x660 [ 254.363215][T11642] tomoyo_mount_acl+0x149/0x840 [ 254.368536][T11642] ? debug_check_no_obj_freed+0x20a/0x43f [ 254.374269][T11642] ? __kasan_check_read+0x11/0x20 [ 254.379714][T11642] ? mark_lock+0xc2/0x1220 [ 254.384195][T11642] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 254.390118][T11642] ? __kasan_check_read+0x11/0x20 [ 254.395165][T11642] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.401602][T11642] ? debug_smp_processor_id+0x33/0x18a [ 254.407084][T11642] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 254.413408][T11642] ? lock_acquire+0x190/0x410 [ 254.418320][T11642] ? tomoyo_mount_permission+0x10a/0x400 [ 254.424412][T11642] tomoyo_mount_permission+0x16a/0x400 [ 254.429938][T11642] ? tomoyo_mount_permission+0x10a/0x400 [ 254.435580][T11642] ? tomoyo_mount_acl+0x840/0x840 [ 254.440651][T11642] ? strncpy_from_user+0x2b4/0x400 [ 254.447120][T11642] tomoyo_sb_mount+0x35/0x40 [ 254.451825][T11642] security_sb_mount+0x87/0xd0 [ 254.456698][T11642] do_mount+0x1d4/0x1b50 [ 254.461234][T11642] ? copy_mount_string+0x40/0x40 [ 254.466376][T11642] ? _copy_from_user+0x12c/0x1a0 [ 254.471312][T11642] ? memdup_user+0x80/0xd0 [ 254.476027][T11642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 254.482281][T11642] ? copy_mount_options+0x2e8/0x3f0 [ 254.487688][T11642] __ia32_compat_sys_mount+0x664/0x790 [ 254.493270][T11642] ? trace_hardirqs_on+0x67/0x240 [ 254.498400][T11642] do_fast_syscall_32+0x27b/0xe16 [ 254.503574][T11642] entry_SYSENTER_compat+0x70/0x7f [ 254.508689][T11642] RIP: 0023:0xf7f1d9a9 [ 254.512869][T11642] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 254.533473][T11642] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 254.542222][T11642] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 254.550415][T11642] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 254.558900][T11642] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 254.567049][T11642] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 254.575180][T11642] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:40:48 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 254.600961][T11642] ERROR: Out of memory at tomoyo_realpath_from_path. 14:40:48 executing program 0 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 254.737156][T11648] FAULT_INJECTION: forcing a failure. [ 254.737156][T11648] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 254.750562][T11648] CPU: 0 PID: 11648 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 254.759592][T11648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.769741][T11648] Call Trace: [ 254.773188][T11648] dump_stack+0x197/0x210 [ 254.777759][T11648] should_fail.cold+0xa/0x15 [ 254.782576][T11648] ? __kmalloc+0x163/0x770 [ 254.787133][T11648] ? fault_create_debugfs_attr+0x180/0x180 [ 254.793088][T11648] ? do_mount+0x1d4/0x1b50 [ 254.797588][T11648] ? __ia32_compat_sys_mount+0x664/0x790 [ 254.803335][T11648] ? do_fast_syscall_32+0x27b/0xe16 [ 254.808798][T11648] ? entry_SYSENTER_compat+0x70/0x7f [ 254.814232][T11648] should_fail_alloc_page+0x50/0x60 [ 254.819442][T11648] __alloc_pages_nodemask+0x1a1/0x910 [ 254.825031][T11648] ? is_bpf_text_address+0xce/0x160 [ 254.830376][T11648] ? __alloc_pages_slowpath+0x2900/0x2900 [ 254.836254][T11648] ? unwind_get_return_address+0x61/0xa0 [ 254.841949][T11648] ? fault_create_debugfs_attr+0x180/0x180 [ 254.848027][T11648] cache_grow_begin+0x90/0xc60 [ 254.852811][T11648] ? tomoyo_realpath_from_path+0xc5/0x660 [ 254.858834][T11648] ? trace_hardirqs_off+0x62/0x240 [ 254.863949][T11648] __kmalloc+0x6b2/0x770 [ 254.868265][T11648] ? __kmalloc+0x608/0x770 [ 254.872692][T11648] ? tomoyo_realpath_from_path+0xc5/0x660 [ 254.878417][T11648] tomoyo_realpath_from_path+0xc5/0x660 [ 254.884110][T11648] tomoyo_mount_acl+0x149/0x840 [ 254.889228][T11648] ? debug_check_no_obj_freed+0x20a/0x43f [ 254.895111][T11648] ? __kasan_check_read+0x11/0x20 [ 254.900255][T11648] ? mark_lock+0xc2/0x1220 [ 254.904777][T11648] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 254.910585][T11648] ? __kasan_check_read+0x11/0x20 [ 254.915830][T11648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.922189][T11648] ? debug_smp_processor_id+0x33/0x18a [ 254.927690][T11648] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 254.934228][T11648] ? lock_acquire+0x190/0x410 [ 254.938908][T11648] ? tomoyo_mount_permission+0x10a/0x400 [ 254.944762][T11648] tomoyo_mount_permission+0x16a/0x400 [ 254.950406][T11648] ? tomoyo_mount_permission+0x10a/0x400 [ 254.956179][T11648] ? tomoyo_mount_acl+0x840/0x840 [ 254.961509][T11648] ? strncpy_from_user+0x2b4/0x400 [ 254.966629][T11648] tomoyo_sb_mount+0x35/0x40 [ 254.971310][T11648] security_sb_mount+0x87/0xd0 [ 254.976083][T11648] do_mount+0x1d4/0x1b50 [ 254.980519][T11648] ? copy_mount_string+0x40/0x40 [ 254.985551][T11648] ? _copy_from_user+0x12c/0x1a0 [ 254.990588][T11648] ? memdup_user+0x80/0xd0 [ 254.995110][T11648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 255.001356][T11648] ? copy_mount_options+0x2e8/0x3f0 [ 255.006575][T11648] __ia32_compat_sys_mount+0x664/0x790 [ 255.012151][T11648] ? trace_hardirqs_on+0x67/0x240 [ 255.017196][T11648] do_fast_syscall_32+0x27b/0xe16 [ 255.022541][T11648] entry_SYSENTER_compat+0x70/0x7f [ 255.027968][T11648] RIP: 0023:0xf7f1d9a9 [ 255.032149][T11648] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 255.051981][T11648] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 255.060689][T11648] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 255.068950][T11648] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 255.076932][T11648] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 255.085327][T11648] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 255.093790][T11648] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 255.212721][T11632] device bridge49 entered promiscuous mode 14:40:49 executing program 2: getpid() setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00000000c0)='\t', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x2, 0x2, 0x5}}, 0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0xe, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) io_setup(0x0, 0x0) 14:40:49 executing program 0 (fault-call:1 fault-nth:7): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:49 executing program 1: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:49 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) [ 255.464818][T11658] FAULT_INJECTION: forcing a failure. [ 255.464818][T11658] name failslab, interval 1, probability 0, space 0, times 0 [ 255.548086][T11658] CPU: 0 PID: 11658 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 255.556996][T11658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.567088][T11658] Call Trace: [ 255.570422][T11658] dump_stack+0x197/0x210 [ 255.574793][T11658] should_fail.cold+0xa/0x15 [ 255.579433][T11658] ? fault_create_debugfs_attr+0x180/0x180 [ 255.585274][T11658] ? ___might_sleep+0x163/0x2c0 [ 255.590165][T11658] __should_failslab+0x121/0x190 [ 255.595340][T11658] should_failslab+0x9/0x14 [ 255.599871][T11658] kmem_cache_alloc_trace+0x2d3/0x790 [ 255.605326][T11658] alloc_fs_context+0x5a/0x810 [ 255.610329][T11658] ? _raw_read_unlock+0x28/0x40 [ 255.615393][T11658] fs_context_for_mount+0x25/0x30 [ 255.620454][T11658] do_mount+0x11b2/0x1b50 [ 255.624823][T11658] ? copy_mount_string+0x40/0x40 [ 255.630080][T11658] ? _copy_from_user+0x12c/0x1a0 [ 255.635219][T11658] ? memdup_user+0x80/0xd0 [ 255.639665][T11658] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 14:40:49 executing program 2: unshare(0x200) r0 = gettid() r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = socket$pppoe(0x18, 0x1, 0x0) preadv(r3, &(0x7f0000000240)=[{&(0x7f0000000800)=""/250, 0xfa}, {&(0x7f0000000900)=""/184, 0xb8}], 0x2, 0xee9) dup2(r2, r1) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x1f}, &(0x7f0000000140)=0x8) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) ioctl$BLKTRACESETUP(r4, 0xc0401273, &(0x7f00000002c0)={[], 0xff, 0x200, 0x2, 0xffffffffffffdd50, 0x80000001, r5}) r6 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x10000000000000, 0x400000) write$binfmt_script(r4, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x5a) prctl$PR_SET_PTRACER(0x59616d61, r0) io_uring_enter(0xffffffffffffffff, 0x80000001, 0x1, 0x1, &(0x7f0000000000), 0x8) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x2000000000880002}, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000280)={0x6, 'veth1_to_bridge\x00', {0x5}, 0x9}) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x1) ioctl$DRM_IOCTL_GET_CAP(r6, 0xc010640c, &(0x7f0000000040)={0x0, 0x30}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r8, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r8, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r7, 0x0, r8, 0x0, 0x10005, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r7) r9 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r9, 0x0, 0x483, &(0x7f0000000380), &(0x7f0000000200)=0x60) [ 255.646112][T11658] ? copy_mount_options+0x2e8/0x3f0 [ 255.651475][T11658] __ia32_compat_sys_mount+0x664/0x790 [ 255.656963][T11658] ? trace_hardirqs_on+0x67/0x240 [ 255.662020][T11658] do_fast_syscall_32+0x27b/0xe16 [ 255.667189][T11658] entry_SYSENTER_compat+0x70/0x7f [ 255.672322][T11658] RIP: 0023:0xf7f1d9a9 [ 255.676839][T11658] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 255.696670][T11658] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 255.705112][T11658] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 255.713248][T11658] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 255.721458][T11658] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 255.729448][T11658] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 255.737560][T11658] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:40:49 executing program 0 (fault-call:1 fault-nth:8): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:50 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) 14:40:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:50 executing program 1: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 256.087211][T11669] device bridge51 entered promiscuous mode [ 256.109478][T11683] FAULT_INJECTION: forcing a failure. [ 256.109478][T11683] name failslab, interval 1, probability 0, space 0, times 0 [ 256.167893][T11683] CPU: 0 PID: 11683 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 256.176611][T11683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.186681][T11683] Call Trace: [ 256.190012][T11683] dump_stack+0x197/0x210 [ 256.194386][T11683] should_fail.cold+0xa/0x15 [ 256.199017][T11683] ? fault_create_debugfs_attr+0x180/0x180 [ 256.204940][T11683] ? ___might_sleep+0x163/0x2c0 [ 256.209833][T11683] __should_failslab+0x121/0x190 [ 256.214799][T11683] should_failslab+0x9/0x14 [ 256.219335][T11683] kmem_cache_alloc_trace+0x2d3/0x790 [ 256.224732][T11683] ? lockdep_init_map+0x1be/0x6d0 [ 256.229937][T11683] ? afs_alloc_inode+0x220/0x220 [ 256.235214][T11683] afs_init_fs_context+0x4a/0x5b0 [ 256.240262][T11683] ? afs_alloc_inode+0x220/0x220 [ 256.245229][T11683] alloc_fs_context+0x4d1/0x810 [ 256.250128][T11683] fs_context_for_mount+0x25/0x30 [ 256.255389][T11683] do_mount+0x11b2/0x1b50 [ 256.259778][T11683] ? copy_mount_string+0x40/0x40 14:40:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) [ 256.264743][T11683] ? _copy_from_user+0x12c/0x1a0 [ 256.269753][T11683] ? memdup_user+0x80/0xd0 [ 256.274203][T11683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.280659][T11683] ? copy_mount_options+0x2e8/0x3f0 [ 256.285983][T11683] __ia32_compat_sys_mount+0x664/0x790 [ 256.291484][T11683] ? trace_hardirqs_on+0x67/0x240 [ 256.296754][T11683] do_fast_syscall_32+0x27b/0xe16 [ 256.301822][T11683] entry_SYSENTER_compat+0x70/0x7f [ 256.307035][T11683] RIP: 0023:0xf7f1d9a9 [ 256.311120][T11683] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 256.331322][T11683] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 256.339992][T11683] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 256.348267][T11683] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 256.356355][T11683] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 256.364353][T11683] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 256.372344][T11683] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:40:50 executing program 0 (fault-call:1 fault-nth:9): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 256.499287][T11696] FAULT_INJECTION: forcing a failure. [ 256.499287][T11696] name failslab, interval 1, probability 0, space 0, times 0 [ 256.520612][T11696] CPU: 1 PID: 11696 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 256.529622][T11696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.539860][T11696] Call Trace: [ 256.543181][T11696] dump_stack+0x197/0x210 [ 256.547651][T11696] should_fail.cold+0xa/0x15 [ 256.552280][T11696] ? fault_create_debugfs_attr+0x180/0x180 [ 256.558239][T11696] ? ___might_sleep+0x163/0x2c0 [ 256.563217][T11696] __should_failslab+0x121/0x190 [ 256.568373][T11696] should_failslab+0x9/0x14 [ 256.572904][T11696] kmem_cache_alloc_trace+0x2d3/0x790 [ 256.578495][T11696] alloc_fs_context+0x5a/0x810 [ 256.583287][T11696] ? _raw_read_unlock+0x28/0x40 [ 256.588342][T11696] fs_context_for_mount+0x25/0x30 [ 256.593529][T11696] do_mount+0x11b2/0x1b50 [ 256.598039][T11696] ? copy_mount_string+0x40/0x40 [ 256.603140][T11696] ? _copy_from_user+0x12c/0x1a0 [ 256.608149][T11696] ? memdup_user+0x80/0xd0 [ 256.612604][T11696] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.618873][T11696] ? copy_mount_options+0x2e8/0x3f0 [ 256.624105][T11696] __ia32_compat_sys_mount+0x664/0x790 [ 256.629590][T11696] ? trace_hardirqs_on+0x67/0x240 [ 256.634769][T11696] do_fast_syscall_32+0x27b/0xe16 [ 256.639951][T11696] entry_SYSENTER_compat+0x70/0x7f [ 256.645236][T11696] RIP: 0023:0xf7f1d9a9 [ 256.649327][T11696] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 256.669442][T11696] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 256.677884][T11696] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 256.685874][T11696] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 14:40:50 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) [ 256.693862][T11696] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 256.701993][T11696] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 256.709966][T11696] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:40:50 executing program 0 (fault-call:1 fault-nth:10): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 256.840746][T11704] FAULT_INJECTION: forcing a failure. [ 256.840746][T11704] name failslab, interval 1, probability 0, space 0, times 0 [ 256.855343][T11704] CPU: 0 PID: 11704 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 256.864163][T11704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.874321][T11704] Call Trace: [ 256.877644][T11704] dump_stack+0x197/0x210 [ 256.882035][T11704] should_fail.cold+0xa/0x15 [ 256.886746][T11704] ? fault_create_debugfs_attr+0x180/0x180 [ 256.892583][T11704] ? ___might_sleep+0x163/0x2c0 [ 256.898095][T11704] __should_failslab+0x121/0x190 [ 256.903069][T11704] should_failslab+0x9/0x14 [ 256.907613][T11704] kmem_cache_alloc_trace+0x2d3/0x790 [ 256.913020][T11704] ? lockdep_init_map+0x1be/0x6d0 [ 256.918214][T11704] ? afs_alloc_inode+0x220/0x220 [ 256.923209][T11704] afs_init_fs_context+0x4a/0x5b0 [ 256.928250][T11704] ? afs_alloc_inode+0x220/0x220 [ 256.933224][T11704] alloc_fs_context+0x4d1/0x810 [ 256.938217][T11704] fs_context_for_mount+0x25/0x30 [ 256.943265][T11704] do_mount+0x11b2/0x1b50 [ 256.947706][T11704] ? copy_mount_string+0x40/0x40 [ 256.952673][T11704] ? _copy_from_user+0x12c/0x1a0 [ 256.957661][T11704] ? memdup_user+0x80/0xd0 [ 256.962132][T11704] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.968445][T11704] ? copy_mount_options+0x2e8/0x3f0 [ 256.973667][T11704] __ia32_compat_sys_mount+0x664/0x790 [ 256.979152][T11704] ? trace_hardirqs_on+0x67/0x240 [ 256.984203][T11704] do_fast_syscall_32+0x27b/0xe16 [ 256.989268][T11704] entry_SYSENTER_compat+0x70/0x7f [ 256.994391][T11704] RIP: 0023:0xf7f1d9a9 [ 256.998786][T11704] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 257.018885][T11704] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 257.027298][T11704] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 14:40:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:51 executing program 0 (fault-call:1 fault-nth:11): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 257.035363][T11704] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 257.044035][T11704] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 257.052709][T11704] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 257.060691][T11704] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 257.178974][T11713] FAULT_INJECTION: forcing a failure. [ 257.178974][T11713] name failslab, interval 1, probability 0, space 0, times 0 [ 257.201454][T11713] CPU: 1 PID: 11713 Comm: syz-executor.0 Not tainted 5.5.0-rc7-syzkaller #0 [ 257.210175][T11713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.220579][T11713] Call Trace: [ 257.223919][T11713] dump_stack+0x197/0x210 [ 257.228295][T11713] should_fail.cold+0xa/0x15 [ 257.232922][T11713] ? fault_create_debugfs_attr+0x180/0x180 [ 257.238800][T11713] ? ___might_sleep+0x163/0x2c0 [ 257.243691][T11713] __should_failslab+0x121/0x190 [ 257.248689][T11713] should_failslab+0x9/0x14 [ 257.253496][T11713] __kmalloc_track_caller+0x2dc/0x760 [ 257.259052][T11713] ? lock_downgrade+0x920/0x920 [ 257.263955][T11713] ? vfs_parse_fs_string+0xe8/0x170 [ 257.269299][T11713] kmemdup_nul+0x31/0xa0 [ 257.273579][T11713] vfs_parse_fs_string+0xe8/0x170 [ 257.278659][T11713] ? vfs_parse_fs_param+0x540/0x540 [ 257.283901][T11713] ? afs_init_fs_context+0x316/0x5b0 [ 257.289211][T11713] ? afs_alloc_inode+0x220/0x220 [ 257.294240][T11713] do_mount+0x6b4/0x1b50 [ 257.298523][T11713] ? copy_mount_string+0x40/0x40 [ 257.303611][T11713] ? _copy_from_user+0x12c/0x1a0 [ 257.308913][T11713] ? memdup_user+0x80/0xd0 [ 257.313521][T11713] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.319887][T11713] ? copy_mount_options+0x2e8/0x3f0 [ 257.325118][T11713] __ia32_compat_sys_mount+0x664/0x790 [ 257.331213][T11713] ? trace_hardirqs_on+0x67/0x240 [ 257.336408][T11713] do_fast_syscall_32+0x27b/0xe16 [ 257.341634][T11713] entry_SYSENTER_compat+0x70/0x7f [ 257.346919][T11713] RIP: 0023:0xf7f1d9a9 [ 257.351363][T11713] Code: 00 00 00 89 d3 5b 5e 5f 5d c3 b8 80 96 98 00 eb c4 8b 04 24 c3 8b 1c 24 c3 8b 34 24 c3 8b 3c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:40:51 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}}, 0x0) 14:40:51 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x5}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f00000001c0)={{0x8, 0x2}, {0x3, 0x9}, 0x4, 0x0, 0x4}) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r4, 0x0, 0x10005, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x2) 14:40:51 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 257.372807][T11713] RSP: 002b:00000000f5d190cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 257.381369][T11713] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 0000000020000140 [ 257.389454][T11713] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 257.397699][T11713] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 257.405857][T11713] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 257.413933][T11713] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:40:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:51 executing program 0 (fault-call:1 fault-nth:12): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:51 executing program 1: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 257.648112][T11725] device bridge11 entered promiscuous mode [ 257.688421][T11726] device bridge53 entered promiscuous mode 14:40:51 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:52 executing program 3: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 14:40:52 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="259afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:52 executing program 5: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}}, 0x0) [ 258.143196][T11740] device bridge11 entered promiscuous mode 14:40:52 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="309afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) close(r2) 14:40:52 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000006800130800000000a90300000200000004000000080008000000000000000001f36b6744254ffe2e417304795bd3bfc6afb407dcb7d4380144abbbd96a81b4bc9481b4358416561939062c20f394e598b574000000000c6d757a3cc10ed9abb13edfa687bdd02808a2605d1b73d76ea549e2012287087c9acc01ec20b742f70000000000080076dc99133f08000000232b013034197c9ff810f6f56c338fe8f6f900f8a14c6fd77505d76a2b096b4570a57e49c0f3d8164537", @ANYRES32=0x0], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x9, 0x4) [ 258.354873][T11757] device bridge13 entered promiscuous mode 14:40:52 executing program 1: creat(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x7ffffc, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0xfffffffffffffeed, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6b4543bdb5c39775}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x305}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x20, 0x12, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) [ 258.399489][T11769] kAFS: unparsable volume name 14:40:52 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="329afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 258.574243][T11779] kAFS: unparsable volume name 14:40:52 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5c9afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 258.680296][T11785] kAFS: unparsable volume name 14:40:52 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe255d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:52 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe2e5d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 14:40:53 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe2f5d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 259.104335][ T2733] ------------[ cut here ]------------ [ 259.110315][ T2733] name 'šþ/]uwo,"¹cðacýµ‚•´[²$ð“5x~µsþ&æ¡tw}ùª™zºcp(' [ 259.117945][ T2733] WARNING: CPU: 1 PID: 2733 at fs/proc/generic.c:178 __xlate_proc_name+0xe7/0x110 [ 259.127152][ T2733] Kernel panic - not syncing: panic_on_warn set ... [ 259.133774][ T2733] CPU: 1 PID: 2733 Comm: kworker/1:13 Not tainted 5.5.0-rc7-syzkaller #0 [ 259.142203][ T2733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.152297][ T2733] Workqueue: afs afs_manage_cell [ 259.157254][ T2733] Call Trace: [ 259.160582][ T2733] dump_stack+0x197/0x210 [ 259.164942][ T2733] ? __xlate_proc_name+0x50/0x110 [ 259.170053][ T2733] panic+0x2e3/0x75c [ 259.174075][ T2733] ? add_taint.cold+0x16/0x16 [ 259.178784][ T2733] ? __kasan_check_write+0x14/0x20 [ 259.184045][ T2733] ? __warn.cold+0x14/0x3e [ 259.188474][ T2733] ? __warn+0xd9/0x1cf [ 259.192568][ T2733] ? __xlate_proc_name+0xe7/0x110 [ 259.197696][ T2733] __warn.cold+0x2f/0x3e [ 259.202012][ T2733] ? __xlate_proc_name+0xe7/0x110 [ 259.207067][ T2733] report_bug+0x289/0x300 [ 259.211426][ T2733] do_error_trap+0x11b/0x200 [ 259.216044][ T2733] do_invalid_op+0x37/0x50 [ 259.220491][ T2733] ? __xlate_proc_name+0xe7/0x110 [ 259.225609][ T2733] invalid_op+0x23/0x30 [ 259.229787][ T2733] RIP: 0010:__xlate_proc_name+0xe7/0x110 [ 259.235446][ T2733] Code: af 09 91 ff 44 89 e0 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 98 09 91 ff 4c 89 fe 48 c7 c7 40 07 39 88 e8 88 b9 61 ff <0f> 0b 41 bc fe ff ff ff eb cb 4c 89 f7 e8 b7 c9 ce ff e9 3d ff ff [ 259.255343][ T2733] RSP: 0018:ffffc900086ef9d0 EFLAGS: 00010282 [ 259.261433][ T2733] RAX: 0000000000000000 RBX: ffff88809779313b RCX: 0000000000000000 [ 259.269457][ T2733] RDX: 0000000000000000 RSI: ffffffff815e5326 RDI: fffff520010ddf2c [ 259.277613][ T2733] RBP: ffffc900086efa00 R08: ffff8880a029c100 R09: fffffbfff165e79e [ 259.285606][ T2733] R10: fffffbfff165e79d R11: ffffffff8b2f3cef R12: 0000000000000000 [ 259.293606][ T2733] R13: ffff888097793139 R14: ffffc900086efb08 R15: ffff888097793139 [ 259.301628][ T2733] ? vprintk_func+0x86/0x189 [ 259.306344][ T2733] __proc_create+0xac/0x860 [ 259.310877][ T2733] ? pde_free+0x110/0x110 [ 259.315322][ T2733] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 259.321514][ T2733] proc_mkdir_data+0xbc/0x1b0 [ 259.326216][ T2733] ? proc_symlink+0x1c0/0x1c0 [ 259.330912][ T2733] ? fscache_free_cookie+0x110/0x1c0 [ 259.336225][ T2733] afs_proc_cell_setup+0x95/0x190 [ 259.341270][ T2733] afs_manage_cell+0x54b/0x1410 [ 259.346153][ T2733] ? afs_put_cell.part.0+0x180/0x180 [ 259.351477][ T2733] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 259.357056][ T2733] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 259.363211][ T2733] ? trace_hardirqs_on+0x67/0x240 [ 259.368376][ T2733] process_one_work+0x9af/0x1740 [ 259.373662][ T2733] ? pwq_dec_nr_in_flight+0x320/0x320 [ 259.379076][ T2733] ? lock_acquire+0x190/0x410 [ 259.384089][ T2733] worker_thread+0x98/0xe40 [ 259.388632][ T2733] kthread+0x361/0x430 [ 259.392730][ T2733] ? process_one_work+0x1740/0x1740 [ 259.397949][ T2733] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 259.403697][ T2733] ret_from_fork+0x24/0x30 [ 259.410221][ T2733] Kernel Offset: disabled [ 259.414840][ T2733] Rebooting in 86400 seconds..