3263][T18826] device bridge_slave_0 left promiscuous mode [ 1463.869423][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1467.433142][T18826] device hsr_slave_0 left promiscuous mode [ 1467.472584][T18826] device hsr_slave_1 left promiscuous mode [ 1467.523454][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1467.536596][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1467.548105][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1467.616964][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1467.720615][T18826] bond0 (unregistering): Released all slaves [ 1467.893270][T18826] device hsr_slave_0 left promiscuous mode [ 1467.932588][T18826] device hsr_slave_1 left promiscuous mode [ 1467.984095][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1467.995461][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1468.009804][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1468.069329][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1468.159724][T18826] bond0 (unregistering): Released all slaves [ 1468.257959][T21253] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1468.269299][T21253] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1468.292270][T21253] team0: Port device team_slave_0 added [ 1468.300394][T21253] team0: Port device team_slave_1 added [ 1468.318547][T21256] IPVS: ftp: loaded support on port[0] = 21 [ 1468.374786][T21253] device hsr_slave_0 entered promiscuous mode [ 1468.442882][T21253] device hsr_slave_1 entered promiscuous mode [ 1468.718616][T21253] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1468.734243][T21256] chnl_net:caif_netlink_parms(): no params data found [ 1468.761669][T21253] 8021q: adding VLAN 0 to HW filter on device team0 [ 1468.789059][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1468.799071][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1468.831592][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1468.840962][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1468.855925][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1468.863034][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1468.882930][T21256] bridge0: port 1(bridge_slave_0) entered blocking state [ 1468.889984][T21256] bridge0: port 1(bridge_slave_0) entered disabled state [ 1468.899986][T21256] device bridge_slave_0 entered promiscuous mode [ 1468.909552][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1468.925125][T21256] bridge0: port 2(bridge_slave_1) entered blocking state [ 1468.932167][T21256] bridge0: port 2(bridge_slave_1) entered disabled state [ 1468.947110][T21256] device bridge_slave_1 entered promiscuous mode [ 1468.973066][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1468.981729][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1468.991866][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1468.998977][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1469.008281][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1469.017290][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1469.040748][T21256] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1469.054951][T21256] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1469.075298][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1469.091924][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1469.110627][T21253] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1469.121714][T21253] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1469.141985][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1469.158380][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1469.169537][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1469.199937][T21256] team0: Port device team_slave_0 added [ 1469.210022][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1469.223774][T21253] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1469.231985][T21256] team0: Port device team_slave_1 added [ 1469.345474][T21256] device hsr_slave_0 entered promiscuous mode [ 1469.402832][T21256] device hsr_slave_1 entered promiscuous mode [ 1469.463420][T21256] debugfs: Directory 'hsr0' with parent '/' already present! [ 1469.585556][T21256] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1469.606866][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1469.630609][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1469.653096][T21256] 8021q: adding VLAN 0 to HW filter on device team0 [ 1469.680000][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1469.696033][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1469.710516][T14674] bridge0: port 1(bridge_slave_0) entered blocking state [ 1469.717646][T14674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1469.735127][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1469.762216][T21264] bridge0: port 2(bridge_slave_1) entered disabled state [ 1469.771600][T21264] bridge0: port 1(bridge_slave_0) entered disabled state [ 1470.482554][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1470.491243][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1470.512916][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 1470.520004][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1470.538039][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1470.559141][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1470.583364][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1470.592257][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1470.612980][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1470.621402][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1470.636975][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1470.645327][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1470.821921][T21256] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1470.833264][T21256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1470.847650][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1470.856040][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1470.864900][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1470.887161][T21256] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1471.089184][T21272] bridge0: port 2(bridge_slave_1) entered disabled state [ 1471.097850][T21272] bridge0: port 1(bridge_slave_0) entered disabled state 07:35:50 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:35:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500006015739d53d5000000"], 0x48}}, 0x0) 07:35:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5f0ffff"], 0x48}}, 0x0) 07:35:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@srh, 0x8) close(r0) 07:35:50 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:35:50 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:35:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500009e15739d53d5000000"], 0x48}}, 0x0) 07:35:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf575, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) 07:35:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:35:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f4236050000f015739d53d5000000"], 0x48}}, 0x0) 07:35:50 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:35:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5ffffff"], 0x48}}, 0x0) [ 1473.140847][T21303] bridge0: port 2(bridge_slave_1) entered disabled state [ 1473.149910][T21303] bridge0: port 1(bridge_slave_0) entered disabled state 07:35:52 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:35:52 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000215739d53d5000000"], 0x48}}, 0x0) 07:35:52 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:35:52 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1474.136674][T21317] IPVS: ftp: loaded support on port[0] = 21 [ 1474.499393][T21317] chnl_net:caif_netlink_parms(): no params data found [ 1474.706316][T21317] bridge0: port 1(bridge_slave_0) entered blocking state [ 1474.713602][T21317] bridge0: port 1(bridge_slave_0) entered disabled state [ 1474.721290][T21317] device bridge_slave_0 entered promiscuous mode [ 1474.729771][T21317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1474.736949][T21317] bridge0: port 2(bridge_slave_1) entered disabled state [ 1474.744660][T21317] device bridge_slave_1 entered promiscuous mode [ 1474.766069][T21320] IPVS: ftp: loaded support on port[0] = 21 [ 1474.921501][T21317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1474.936704][T21317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1475.097495][T21317] team0: Port device team_slave_0 added [ 1475.104907][T21317] team0: Port device team_slave_1 added [ 1475.306151][T21317] device hsr_slave_0 entered promiscuous mode [ 1475.382827][T21317] device hsr_slave_1 entered promiscuous mode [ 1475.432467][T21317] debugfs: Directory 'hsr0' with parent '/' already present! [ 1475.458695][T18826] device bridge_slave_1 left promiscuous mode [ 1475.468104][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1475.533643][T18826] device bridge_slave_0 left promiscuous mode [ 1475.539845][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1475.594426][T18826] device bridge_slave_1 left promiscuous mode [ 1475.600607][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1475.653546][T18826] device bridge_slave_0 left promiscuous mode [ 1475.659731][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1479.243216][T18826] device hsr_slave_0 left promiscuous mode [ 1479.282659][T18826] device hsr_slave_1 left promiscuous mode [ 1479.333478][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1479.345669][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1479.356256][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1479.387532][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1479.491783][T18826] bond0 (unregistering): Released all slaves [ 1479.613351][T18826] device hsr_slave_0 left promiscuous mode [ 1479.652521][T18826] device hsr_slave_1 left promiscuous mode [ 1479.713350][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1479.725334][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1479.736306][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1479.809741][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1479.898640][T18826] bond0 (unregistering): Released all slaves [ 1480.034116][T21320] chnl_net:caif_netlink_parms(): no params data found [ 1480.080535][T21320] bridge0: port 1(bridge_slave_0) entered blocking state [ 1480.088127][T21320] bridge0: port 1(bridge_slave_0) entered disabled state [ 1480.096328][T21320] device bridge_slave_0 entered promiscuous mode [ 1480.108093][T21320] bridge0: port 2(bridge_slave_1) entered blocking state [ 1480.117587][T21320] bridge0: port 2(bridge_slave_1) entered disabled state [ 1480.125666][T21320] device bridge_slave_1 entered promiscuous mode [ 1480.143012][T21320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1480.163954][T21320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1480.195658][T21317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1480.280072][T21320] team0: Port device team_slave_0 added [ 1480.287489][T21320] team0: Port device team_slave_1 added [ 1480.345333][T21320] device hsr_slave_0 entered promiscuous mode [ 1480.442991][T21320] device hsr_slave_1 entered promiscuous mode [ 1480.522032][T21317] 8021q: adding VLAN 0 to HW filter on device team0 [ 1480.542017][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1480.550402][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1480.590570][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1480.600401][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1480.615907][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 1480.623008][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1480.637589][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1480.647598][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1480.661953][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 1480.669040][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1480.684579][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1480.699008][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1480.736310][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1480.744916][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1480.754135][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1480.763750][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1480.773592][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1480.782080][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1480.791093][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1480.811763][T21317] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1480.830107][T21317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1480.839656][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1480.855536][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1480.868549][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1480.909205][T21320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1480.918208][T21317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1480.944788][T21320] 8021q: adding VLAN 0 to HW filter on device team0 [ 1480.951679][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1480.963718][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1481.000190][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1481.009742][ T8743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1481.016858][ T8743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1481.024962][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1481.033485][ T8743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1481.040537][ T8743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1481.062446][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1481.071484][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1481.102305][T21320] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1481.129566][T21320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1481.143281][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1481.158335][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1481.170291][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1481.180968][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1481.189629][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1481.198191][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1481.206842][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1481.215561][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1481.237363][T21320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1481.368462][T21331] bridge0: port 2(bridge_slave_1) entered disabled state [ 1481.378250][T21331] bridge0: port 1(bridge_slave_0) entered disabled state 07:36:00 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1482.331651][T21336] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.340720][T21336] bridge0: port 1(bridge_slave_0) entered disabled state 07:36:01 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:01 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:01 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:01 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000415739d53d5000000"], 0x48}}, 0x0) 07:36:01 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:01 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:01 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000a15739d53d5000000"], 0x48}}, 0x0) 07:36:02 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:02 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:02 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000e15739d53d5000000"], 0x48}}, 0x0) 07:36:02 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:02 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:02 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000f15739d53d5000000"], 0x48}}, 0x0) [ 1485.086783][T21371] IPVS: ftp: loaded support on port[0] = 21 [ 1485.786047][T21371] chnl_net:caif_netlink_parms(): no params data found [ 1485.817586][T21371] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.825702][T21371] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.833937][T21371] device bridge_slave_0 entered promiscuous mode [ 1485.842153][T21371] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.850226][T21371] bridge0: port 2(bridge_slave_1) entered disabled state [ 1485.858491][T21371] device bridge_slave_1 entered promiscuous mode [ 1486.111978][T21371] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1486.123097][T21371] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1486.138602][T21374] IPVS: ftp: loaded support on port[0] = 21 [ 1486.351666][T21371] team0: Port device team_slave_0 added [ 1486.359993][T21371] team0: Port device team_slave_1 added [ 1486.696109][T21371] device hsr_slave_0 entered promiscuous mode [ 1486.743966][T21371] device hsr_slave_1 entered promiscuous mode [ 1486.782569][T21371] debugfs: Directory 'hsr0' with parent '/' already present! [ 1486.814443][T21376] IPVS: ftp: loaded support on port[0] = 21 [ 1487.525408][T21374] chnl_net:caif_netlink_parms(): no params data found [ 1487.590139][T18826] device bridge_slave_1 left promiscuous mode [ 1487.597887][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.653579][T18826] device bridge_slave_0 left promiscuous mode [ 1487.660061][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.714759][T18826] device bridge_slave_1 left promiscuous mode [ 1487.720995][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.773151][T18826] device bridge_slave_0 left promiscuous mode [ 1487.779316][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.835234][T18826] device bridge_slave_1 left promiscuous mode [ 1487.841416][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.893551][T18826] device bridge_slave_0 left promiscuous mode [ 1487.899842][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1493.402969][T18826] device hsr_slave_0 left promiscuous mode [ 1493.442622][T18826] device hsr_slave_1 left promiscuous mode [ 1493.521217][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1493.534659][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1493.545736][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1493.589780][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1493.680145][T18826] bond0 (unregistering): Released all slaves [ 1493.813442][T18826] device hsr_slave_0 left promiscuous mode [ 1493.852664][T18826] device hsr_slave_1 left promiscuous mode [ 1493.904421][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1493.917083][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1493.927604][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1493.967927][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1494.060055][T18826] bond0 (unregistering): Released all slaves [ 1494.273102][T18826] device hsr_slave_0 left promiscuous mode [ 1494.342706][T18826] device hsr_slave_1 left promiscuous mode [ 1494.413610][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1494.425797][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1494.437247][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1494.488668][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1494.561898][T18826] bond0 (unregistering): Released all slaves [ 1494.680299][T21376] chnl_net:caif_netlink_parms(): no params data found [ 1494.710856][T21371] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1494.735117][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1494.746975][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1494.765150][T21371] 8021q: adding VLAN 0 to HW filter on device team0 [ 1494.772048][T21374] bridge0: port 1(bridge_slave_0) entered blocking state [ 1494.779705][T21374] bridge0: port 1(bridge_slave_0) entered disabled state [ 1494.788120][T21374] device bridge_slave_0 entered promiscuous mode [ 1494.800174][T21374] bridge0: port 2(bridge_slave_1) entered blocking state [ 1494.807421][T21374] bridge0: port 2(bridge_slave_1) entered disabled state [ 1494.816448][T21374] device bridge_slave_1 entered promiscuous mode [ 1494.835671][T21376] bridge0: port 1(bridge_slave_0) entered blocking state [ 1494.843693][T21376] bridge0: port 1(bridge_slave_0) entered disabled state [ 1494.851426][T21376] device bridge_slave_0 entered promiscuous mode [ 1494.866456][T21374] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1494.876445][T21376] bridge0: port 2(bridge_slave_1) entered blocking state [ 1494.883641][T21376] bridge0: port 2(bridge_slave_1) entered disabled state [ 1494.891574][T21376] device bridge_slave_1 entered promiscuous mode [ 1494.907800][T21374] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1494.924219][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1494.933328][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1494.941613][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1494.948700][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1494.970854][T21374] team0: Port device team_slave_0 added [ 1494.983346][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1494.991657][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1495.000533][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1495.009070][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1495.016167][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1495.025586][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1495.036107][T21376] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1495.046742][T21374] team0: Port device team_slave_1 added [ 1495.062118][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1495.070636][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1495.079577][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1495.088390][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1495.097464][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1495.107297][T21376] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1495.165628][T21374] device hsr_slave_0 entered promiscuous mode [ 1495.202975][T21374] device hsr_slave_1 entered promiscuous mode [ 1495.242556][T21374] debugfs: Directory 'hsr0' with parent '/' already present! [ 1495.251639][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1495.259804][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1495.268275][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1495.290024][T21376] team0: Port device team_slave_0 added [ 1495.297947][T21376] team0: Port device team_slave_1 added [ 1495.319630][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1495.328099][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1495.374712][T21376] device hsr_slave_0 entered promiscuous mode [ 1495.443051][T21376] device hsr_slave_1 entered promiscuous mode [ 1495.492488][T21376] debugfs: Directory 'hsr0' with parent '/' already present! [ 1495.505239][T21371] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1495.532180][T21371] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1495.545144][T21376] bridge0: port 2(bridge_slave_1) entered blocking state [ 1495.552231][T21376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1495.620300][T21374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1495.668386][T21376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1495.697407][T20262] bridge0: port 2(bridge_slave_1) entered disabled state [ 1495.715968][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1495.724161][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1495.733352][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1495.741017][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1495.797646][T21374] 8021q: adding VLAN 0 to HW filter on device team0 [ 1495.806971][T21385] bridge0: port 2(bridge_slave_1) entered disabled state [ 1495.816483][T21385] bridge0: port 1(bridge_slave_0) entered disabled state 07:36:14 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:14 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:15 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500006015739d53d5000000"], 0x48}}, 0x0) [ 1496.450349][T21376] 8021q: adding VLAN 0 to HW filter on device team0 [ 1497.061266][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1497.076519][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1497.090324][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1497.103527][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1497.111996][ T8743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.119099][ T8743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1497.135266][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1497.148444][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1497.159533][ T8743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1497.166653][ T8743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1497.182258][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1497.191613][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1497.207200][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1497.218393][ T8743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.225499][ T8743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1497.240679][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1497.251584][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1497.267332][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1497.278558][ T8743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1497.285667][ T8743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1497.300972][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1497.310966][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1497.326262][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1497.338915][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1497.351630][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1497.367349][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1497.379017][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1497.392293][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1497.408815][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1497.419110][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1497.438270][T21374] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1497.456959][T21374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1497.476655][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1497.494439][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1497.512880][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1497.520698][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1497.530739][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1497.541216][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1497.550589][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1497.559514][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1497.569035][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1497.590575][T21376] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1497.603897][T21376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1497.618778][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1497.627724][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1497.657974][T21374] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1497.677437][T21376] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1497.907801][T21405] bridge0: port 2(bridge_slave_1) entered disabled state [ 1497.917311][T21405] bridge0: port 1(bridge_slave_0) entered disabled state 07:36:17 executing program 2: 07:36:17 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:17 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500009e15739d53d5000000"], 0x48}}, 0x0) 07:36:17 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:17 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1498.754025][T21407] bridge0: port 2(bridge_slave_1) entered disabled state [ 1498.761535][T21407] bridge0: port 1(bridge_slave_0) entered disabled state 07:36:17 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000040739d53d5000000"], 0x48}}, 0x0) 07:36:17 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:17 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:17 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:18 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5020000"], 0x48}}, 0x0) 07:36:18 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:18 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5040000"], 0x48}}, 0x0) 07:36:18 executing program 2: [ 1500.923552][T21447] IPVS: ftp: loaded support on port[0] = 21 [ 1500.999903][T21447] chnl_net:caif_netlink_parms(): no params data found [ 1501.029414][T21447] bridge0: port 1(bridge_slave_0) entered blocking state [ 1501.036647][T21447] bridge0: port 1(bridge_slave_0) entered disabled state [ 1501.044724][T21447] device bridge_slave_0 entered promiscuous mode [ 1501.052628][T21447] bridge0: port 2(bridge_slave_1) entered blocking state [ 1501.059886][T21447] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.067883][T21447] device bridge_slave_1 entered promiscuous mode [ 1501.084830][T21447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1501.643834][T21447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1501.671780][T21447] team0: Port device team_slave_0 added [ 1501.680361][T21447] team0: Port device team_slave_1 added [ 1502.037509][T21447] device hsr_slave_0 entered promiscuous mode [ 1502.093051][T21447] device hsr_slave_1 entered promiscuous mode [ 1502.142634][T21447] debugfs: Directory 'hsr0' with parent '/' already present! [ 1502.164989][T21450] IPVS: ftp: loaded support on port[0] = 21 [ 1502.797427][T21450] chnl_net:caif_netlink_parms(): no params data found [ 1503.111853][T21447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1503.131665][T21450] bridge0: port 1(bridge_slave_0) entered blocking state [ 1503.141699][T21450] bridge0: port 1(bridge_slave_0) entered disabled state [ 1503.149876][T21450] device bridge_slave_0 entered promiscuous mode [ 1503.437386][T21450] bridge0: port 2(bridge_slave_1) entered blocking state [ 1503.445781][T21450] bridge0: port 2(bridge_slave_1) entered disabled state [ 1503.454134][T21450] device bridge_slave_1 entered promiscuous mode [ 1503.469470][T21447] 8021q: adding VLAN 0 to HW filter on device team0 [ 1503.765152][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1503.773478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1503.795023][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1503.803883][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1503.812239][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1503.819349][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1503.827444][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1503.836725][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1503.845238][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 1503.852276][ T8780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1503.863126][T21450] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1503.873611][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1503.881489][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1504.177963][T21450] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1504.200760][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1504.212320][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1504.221223][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1504.237841][T21450] team0: Port device team_slave_0 added [ 1504.246310][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1504.256803][T21450] team0: Port device team_slave_1 added [ 1504.543705][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1504.552688][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1504.576139][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1504.587459][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1504.599708][T18826] device bridge_slave_1 left promiscuous mode [ 1504.607367][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1504.634801][T18826] device bridge_slave_0 left promiscuous mode [ 1504.640957][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1504.694127][T18826] device bridge_slave_1 left promiscuous mode [ 1504.700284][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1504.753580][T18826] device bridge_slave_0 left promiscuous mode [ 1504.759799][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1504.823999][T18826] device bridge_slave_1 left promiscuous mode [ 1504.830215][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1504.873223][T18826] device bridge_slave_0 left promiscuous mode [ 1504.879385][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1504.943773][T18826] device bridge_slave_1 left promiscuous mode [ 1504.949963][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1505.003295][T18826] device bridge_slave_0 left promiscuous mode [ 1505.009530][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1512.303167][T18826] device hsr_slave_0 left promiscuous mode [ 1512.342692][T18826] device hsr_slave_1 left promiscuous mode [ 1512.394860][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1512.407644][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1512.418918][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1512.486436][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1512.579025][T18826] bond0 (unregistering): Released all slaves [ 1512.723204][T18826] device hsr_slave_0 left promiscuous mode [ 1512.762740][T18826] device hsr_slave_1 left promiscuous mode [ 1512.813301][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1512.825098][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1512.835695][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1512.879769][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1512.950616][T18826] bond0 (unregistering): Released all slaves [ 1513.103656][T18826] device hsr_slave_0 left promiscuous mode [ 1513.172557][T18826] device hsr_slave_1 left promiscuous mode [ 1513.233212][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1513.244801][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1513.256724][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1513.306422][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1513.428378][T18826] bond0 (unregistering): Released all slaves [ 1513.594509][T18826] device hsr_slave_0 left promiscuous mode [ 1513.632666][T18826] device hsr_slave_1 left promiscuous mode [ 1513.683388][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1513.694933][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1513.705728][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1513.776486][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1513.848140][T18826] bond0 (unregistering): Released all slaves [ 1514.035263][T21450] device hsr_slave_0 entered promiscuous mode [ 1514.082918][T21450] device hsr_slave_1 entered promiscuous mode [ 1514.171599][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1514.179898][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1514.198311][T21447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1514.230817][T21447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1514.259189][T21450] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1514.278344][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1514.286598][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1514.302835][T21450] 8021q: adding VLAN 0 to HW filter on device team0 [ 1514.314952][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1514.323812][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1514.332281][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1514.339424][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1514.348096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1514.364924][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1514.373563][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1514.380658][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1514.406711][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1514.415270][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1514.429838][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1514.439059][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1514.455353][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1514.464084][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1514.473239][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1514.481547][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1514.490319][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1514.499222][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1514.509446][T21457] bridge0: port 2(bridge_slave_1) entered disabled state [ 1514.517893][T21457] bridge0: port 1(bridge_slave_0) entered disabled state [ 1515.077407][T21450] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1515.104055][T21450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1515.165316][T21450] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1515.285732][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1515.294216][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1515.701190][T21466] bridge0: port 2(bridge_slave_1) entered disabled state [ 1515.710659][T21466] bridge0: port 1(bridge_slave_0) entered disabled state 07:36:35 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:35 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:35 executing program 2: 07:36:35 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50a0000"], 0x48}}, 0x0) 07:36:35 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:35 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:35 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:36:35 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50e0000"], 0x48}}, 0x0) 07:36:35 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500f0ff"], 0x48}}, 0x0) 07:36:35 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50f0000"], 0x48}}, 0x0) 07:36:35 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:35 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000200"], 0x48}}, 0x0) [ 1518.774246][T21497] IPVS: ftp: loaded support on port[0] = 21 [ 1518.883647][T21497] chnl_net:caif_netlink_parms(): no params data found [ 1518.912537][T21497] bridge0: port 1(bridge_slave_0) entered blocking state [ 1518.919686][T21497] bridge0: port 1(bridge_slave_0) entered disabled state [ 1518.927687][T21497] device bridge_slave_0 entered promiscuous mode [ 1518.935479][T21497] bridge0: port 2(bridge_slave_1) entered blocking state [ 1518.942649][T21497] bridge0: port 2(bridge_slave_1) entered disabled state [ 1518.950405][T21497] device bridge_slave_1 entered promiscuous mode [ 1518.969602][T21497] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1518.981550][T21497] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1519.001204][T21497] team0: Port device team_slave_0 added [ 1519.008537][T21497] team0: Port device team_slave_1 added [ 1519.075047][T21497] device hsr_slave_0 entered promiscuous mode [ 1519.132933][T21497] device hsr_slave_1 entered promiscuous mode [ 1519.192545][T21497] debugfs: Directory 'hsr0' with parent '/' already present! [ 1519.460573][T21497] bridge0: port 2(bridge_slave_1) entered blocking state [ 1519.467820][T21497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1519.475251][T21497] bridge0: port 1(bridge_slave_0) entered blocking state [ 1519.482301][T21497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1519.740918][T21501] IPVS: ftp: loaded support on port[0] = 21 [ 1519.751950][T21502] IPVS: ftp: loaded support on port[0] = 21 [ 1519.763763][T21497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1519.916056][T17571] bridge0: port 1(bridge_slave_0) entered disabled state [ 1519.923877][T17571] bridge0: port 2(bridge_slave_1) entered disabled state [ 1519.932810][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1520.097448][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1520.105580][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1520.117798][T21497] 8021q: adding VLAN 0 to HW filter on device team0 [ 1520.259814][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1520.269405][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1520.277728][ T8743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1520.284833][ T8743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1520.313103][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1520.323331][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1520.331618][T17571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1520.338707][T17571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1520.346596][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1520.497197][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1520.537501][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1520.546075][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1520.709085][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1520.716955][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1520.725871][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1520.753508][T21497] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1520.764362][T21497] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1520.776920][T21501] chnl_net:caif_netlink_parms(): no params data found [ 1520.924873][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1520.933683][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1520.941986][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1520.950424][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1520.958995][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1520.976041][T21502] chnl_net:caif_netlink_parms(): no params data found [ 1521.149151][T21497] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1521.189880][T21501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1521.199037][T21501] bridge0: port 1(bridge_slave_0) entered disabled state [ 1521.208691][T21501] device bridge_slave_0 entered promiscuous mode [ 1521.225293][T18826] device bridge_slave_1 left promiscuous mode [ 1521.231470][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1521.263500][T18826] device bridge_slave_0 left promiscuous mode [ 1521.269712][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1521.335543][T18826] device bridge_slave_1 left promiscuous mode [ 1521.341716][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1521.384081][T18826] device bridge_slave_0 left promiscuous mode [ 1521.390294][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1524.933012][T18826] device hsr_slave_0 left promiscuous mode [ 1524.972505][T18826] device hsr_slave_1 left promiscuous mode [ 1525.033976][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1525.046265][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1525.057267][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1525.087720][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1525.180232][T18826] bond0 (unregistering): Released all slaves [ 1525.323118][T18826] device hsr_slave_0 left promiscuous mode [ 1525.372667][T18826] device hsr_slave_1 left promiscuous mode [ 1525.443562][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1525.455736][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1525.466858][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1525.507036][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1525.609178][T18826] bond0 (unregistering): Released all slaves [ 1525.737840][T21501] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.747674][T21501] bridge0: port 2(bridge_slave_1) entered disabled state [ 1525.759005][T21501] device bridge_slave_1 entered promiscuous mode [ 1525.771918][T21502] bridge0: port 1(bridge_slave_0) entered blocking state [ 1525.779641][T21502] bridge0: port 1(bridge_slave_0) entered disabled state [ 1525.788691][T21502] device bridge_slave_0 entered promiscuous mode [ 1525.796827][T21502] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.803931][T21502] bridge0: port 2(bridge_slave_1) entered disabled state [ 1525.811510][T21502] device bridge_slave_1 entered promiscuous mode [ 1525.834201][T21501] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1525.859420][T21502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1525.871221][T21501] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1525.901583][T21502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1525.939940][T21501] team0: Port device team_slave_0 added [ 1525.959860][T21501] team0: Port device team_slave_1 added [ 1525.968274][T21502] team0: Port device team_slave_0 added [ 1525.979996][T21502] team0: Port device team_slave_1 added [ 1525.998540][T21511] bridge0: port 2(bridge_slave_1) entered disabled state [ 1526.007927][T21511] bridge0: port 1(bridge_slave_0) entered disabled state [ 1526.595727][T21501] device hsr_slave_0 entered promiscuous mode [ 1526.648440][T21501] device hsr_slave_1 entered promiscuous mode [ 1527.069916][T21502] device hsr_slave_0 entered promiscuous mode [ 1527.122874][T21502] device hsr_slave_1 entered promiscuous mode [ 1527.162534][T21502] debugfs: Directory 'hsr0' with parent '/' already present! [ 1527.270423][T21501] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1527.315897][T21501] 8021q: adding VLAN 0 to HW filter on device team0 [ 1527.336324][T21502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1527.347142][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1527.357951][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1527.393831][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1527.408809][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1527.418716][T17571] bridge0: port 1(bridge_slave_0) entered blocking state [ 1527.425827][T17571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1527.442547][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1527.451274][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1527.465919][T17571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1527.473019][T17571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1527.486841][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1527.496842][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1527.510768][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1527.520964][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1527.540605][T21502] 8021q: adding VLAN 0 to HW filter on device team0 [ 1527.570842][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1527.581449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1527.598680][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1527.611327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1527.621998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1527.636981][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1527.648308][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1527.660346][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1527.671503][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1527.685637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1527.704492][T21501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1527.713086][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1527.721714][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1527.730917][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1527.738019][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1527.746357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1527.755493][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1527.764428][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1527.771490][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1527.794026][T21501] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1527.817136][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1527.825653][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1527.834790][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1527.848878][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1527.868945][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1527.880510][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1527.891293][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1527.900353][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1527.908885][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1527.918167][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1527.930849][T21502] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1527.942781][T21502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1527.950697][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1527.962018][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1527.988698][T21502] 8021q: adding VLAN 0 to HW filter on device batadv0 07:36:46 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:46 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5600000"], 0x48}}, 0x0) 07:36:46 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:46 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000400"], 0x48}}, 0x0) 07:36:46 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:46 executing program 2: 07:36:47 executing program 2: 07:36:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d59e0000"], 0x48}}, 0x0) 07:36:47 executing program 2: 07:36:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000a00"], 0x48}}, 0x0) 07:36:47 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5f00000"], 0x48}}, 0x0) [ 1529.248647][T21555] bridge0: port 2(bridge_slave_1) entered disabled state [ 1529.256095][T21555] bridge0: port 1(bridge_slave_0) entered disabled state 07:36:48 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:48 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000e00"], 0x48}}, 0x0) [ 1530.694774][T21565] IPVS: ftp: loaded support on port[0] = 21 [ 1530.894004][T21565] chnl_net:caif_netlink_parms(): no params data found [ 1530.921840][T21565] bridge0: port 1(bridge_slave_0) entered blocking state [ 1530.930098][T21565] bridge0: port 1(bridge_slave_0) entered disabled state [ 1530.937888][T21565] device bridge_slave_0 entered promiscuous mode [ 1531.074024][T21565] bridge0: port 2(bridge_slave_1) entered blocking state [ 1531.081103][T21565] bridge0: port 2(bridge_slave_1) entered disabled state [ 1531.089029][T21565] device bridge_slave_1 entered promiscuous mode [ 1531.107546][T21565] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1531.118314][T21565] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1531.138242][T21565] team0: Port device team_slave_0 added [ 1531.145404][T21565] team0: Port device team_slave_1 added [ 1531.325010][T21565] device hsr_slave_0 entered promiscuous mode [ 1531.352811][T21565] device hsr_slave_1 entered promiscuous mode [ 1531.392637][T21565] debugfs: Directory 'hsr0' with parent '/' already present! [ 1531.541265][T21568] IPVS: ftp: loaded support on port[0] = 21 [ 1531.545852][T21565] bridge0: port 2(bridge_slave_1) entered blocking state [ 1531.554305][T21565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1531.561717][T21565] bridge0: port 1(bridge_slave_0) entered blocking state [ 1531.568787][T21565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1531.581399][T17571] bridge0: port 1(bridge_slave_0) entered disabled state [ 1531.589674][T17571] bridge0: port 2(bridge_slave_1) entered disabled state [ 1531.948411][T21568] chnl_net:caif_netlink_parms(): no params data found [ 1532.119411][T21568] bridge0: port 1(bridge_slave_0) entered blocking state [ 1532.126643][T21568] bridge0: port 1(bridge_slave_0) entered disabled state [ 1532.134791][T21568] device bridge_slave_0 entered promiscuous mode [ 1532.144075][T21568] bridge0: port 2(bridge_slave_1) entered blocking state [ 1532.151197][T21568] bridge0: port 2(bridge_slave_1) entered disabled state [ 1532.159216][T21568] device bridge_slave_1 entered promiscuous mode [ 1532.178617][T18826] device bridge_slave_1 left promiscuous mode [ 1532.186239][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1532.233251][T18826] device bridge_slave_0 left promiscuous mode [ 1532.239426][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1532.284569][T18826] device bridge_slave_1 left promiscuous mode [ 1532.290741][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 1532.343725][T18826] device bridge_slave_0 left promiscuous mode [ 1532.349895][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.983222][T18826] device hsr_slave_0 left promiscuous mode [ 1536.033503][T18826] device hsr_slave_1 left promiscuous mode [ 1536.082314][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1536.096911][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1536.107460][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1536.147241][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1536.238484][T18826] bond0 (unregistering): Released all slaves [ 1536.403387][T18826] device hsr_slave_0 left promiscuous mode [ 1536.452683][T18826] device hsr_slave_1 left promiscuous mode [ 1536.504788][T18826] team0 (unregistering): Port device team_slave_1 removed [ 1536.517782][T18826] team0 (unregistering): Port device team_slave_0 removed [ 1536.530164][T18826] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1536.558297][T18826] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1536.651211][T18826] bond0 (unregistering): Released all slaves [ 1536.760455][T21565] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1536.768875][T21568] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1536.782182][T21568] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1536.807837][T21568] team0: Port device team_slave_0 added [ 1536.816436][T21568] team0: Port device team_slave_1 added [ 1536.839113][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1536.847287][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1536.856483][T21565] 8021q: adding VLAN 0 to HW filter on device team0 [ 1536.928452][T21568] device hsr_slave_0 entered promiscuous mode [ 1536.982921][T21568] device hsr_slave_1 entered promiscuous mode [ 1537.055278][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1537.064091][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1537.072483][T21134] bridge0: port 1(bridge_slave_0) entered blocking state [ 1537.079528][T21134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1537.087198][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1537.096133][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1537.104583][T21134] bridge0: port 2(bridge_slave_1) entered blocking state [ 1537.111621][T21134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1537.119230][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1537.145871][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1537.165755][T21565] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1537.177025][T21565] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1537.190034][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1537.199515][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1537.208029][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1537.216558][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1537.225329][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1537.233728][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1537.241938][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1537.250573][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1537.258900][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1537.267423][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1537.427236][T21565] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1537.443006][T21568] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1537.474615][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1537.483209][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1537.493877][T21568] 8021q: adding VLAN 0 to HW filter on device team0 [ 1537.526220][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1537.536065][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1537.545175][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1537.552241][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1537.560910][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1537.569698][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1537.579190][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 1537.586320][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1537.599641][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1537.608517][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1537.623355][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1537.632060][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1537.658155][T21568] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1537.670284][T21568] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1537.684188][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1537.692176][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1537.720240][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1537.739658][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1537.776103][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1537.812092][T21568] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1537.888506][T21576] bridge0: port 2(bridge_slave_1) entered disabled state [ 1537.897676][T21576] bridge0: port 1(bridge_slave_0) entered disabled state 07:36:57 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:57 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000a00"], 0x48}}, 0x0) [ 1539.076051][T21586] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.085461][T21586] bridge0: port 1(bridge_slave_0) entered disabled state 07:36:58 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff00", 0x9, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:58 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:58 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000f00"], 0x48}}, 0x0) 07:36:58 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:58 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000e00"], 0x48}}, 0x0) 07:36:58 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:58 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:58 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5006000"], 0x48}}, 0x0) 07:36:58 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000f00"], 0x48}}, 0x0) 07:36:58 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff00", 0x9, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:36:59 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500a500"], 0x48}}, 0x0) 07:36:59 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5003f00"], 0x48}}, 0x0) 07:36:59 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff00", 0x9, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1541.735236][T21615] IPVS: ftp: loaded support on port[0] = 21 [ 1541.991442][T21615] chnl_net:caif_netlink_parms(): no params data found [ 1542.375232][T21620] IPVS: ftp: loaded support on port[0] = 21 [ 1542.577081][T21615] bridge0: port 1(bridge_slave_0) entered blocking state [ 1542.585068][T21615] bridge0: port 1(bridge_slave_0) entered disabled state [ 1542.592973][T21615] device bridge_slave_0 entered promiscuous mode [ 1542.611958][T21622] IPVS: ftp: loaded support on port[0] = 21 [ 1542.621573][T21615] bridge0: port 2(bridge_slave_1) entered blocking state [ 1542.628843][T21615] bridge0: port 2(bridge_slave_1) entered disabled state [ 1542.636484][T21615] device bridge_slave_1 entered promiscuous mode [ 1542.856058][T21621] IPVS: ftp: loaded support on port[0] = 21 [ 1542.877037][T21615] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1542.906122][T21615] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1543.151227][T21615] team0: Port device team_slave_0 added [ 1543.159014][T21615] team0: Port device team_slave_1 added [ 1543.684343][T21615] device hsr_slave_0 entered promiscuous mode [ 1543.722955][T21615] device hsr_slave_1 entered promiscuous mode [ 1543.762536][T21615] debugfs: Directory 'hsr0' with parent '/' already present! [ 1543.774803][T21620] chnl_net:caif_netlink_parms(): no params data found [ 1543.799748][ T2414] device bridge_slave_1 left promiscuous mode [ 1543.806981][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.844171][ T2414] device bridge_slave_0 left promiscuous mode [ 1543.850365][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1543.903777][ T2414] device bridge_slave_1 left promiscuous mode [ 1543.909943][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.973572][ T2414] device bridge_slave_0 left promiscuous mode [ 1543.979767][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1544.044678][ T2414] device bridge_slave_1 left promiscuous mode [ 1544.050862][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1544.085226][ T2414] device bridge_slave_0 left promiscuous mode [ 1544.091400][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1549.233160][ T2414] device hsr_slave_0 left promiscuous mode [ 1549.272694][ T2414] device hsr_slave_1 left promiscuous mode [ 1549.322181][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1549.335414][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1549.346331][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1549.387078][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1549.476537][ T2414] bond0 (unregistering): Released all slaves [ 1549.633341][ T2414] device hsr_slave_0 left promiscuous mode [ 1549.672921][ T2414] device hsr_slave_1 left promiscuous mode [ 1549.749662][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1549.762734][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1549.773431][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1549.826391][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1549.916033][ T2414] bond0 (unregistering): Released all slaves [ 1550.073141][ T2414] device hsr_slave_0 left promiscuous mode [ 1550.132578][ T2414] device hsr_slave_1 left promiscuous mode [ 1550.204620][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1550.217332][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1550.228389][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1550.289235][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1550.378326][ T2414] bond0 (unregistering): Released all slaves [ 1550.553535][T21622] chnl_net:caif_netlink_parms(): no params data found [ 1550.576428][T21620] bridge0: port 1(bridge_slave_0) entered blocking state [ 1550.584162][T21620] bridge0: port 1(bridge_slave_0) entered disabled state [ 1550.591780][T21620] device bridge_slave_0 entered promiscuous mode [ 1550.619280][T21620] bridge0: port 2(bridge_slave_1) entered blocking state [ 1550.626582][T21620] bridge0: port 2(bridge_slave_1) entered disabled state [ 1550.634596][T21620] device bridge_slave_1 entered promiscuous mode [ 1550.672029][T21621] chnl_net:caif_netlink_parms(): no params data found [ 1550.685379][T21622] bridge0: port 1(bridge_slave_0) entered blocking state [ 1550.693701][T21622] bridge0: port 1(bridge_slave_0) entered disabled state [ 1550.701320][T21622] device bridge_slave_0 entered promiscuous mode [ 1550.720929][T21620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1550.733360][T21622] bridge0: port 2(bridge_slave_1) entered blocking state [ 1550.740404][T21622] bridge0: port 2(bridge_slave_1) entered disabled state [ 1550.748286][T21622] device bridge_slave_1 entered promiscuous mode [ 1550.756674][T21620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1550.794917][T21620] team0: Port device team_slave_0 added [ 1550.813708][T21620] team0: Port device team_slave_1 added [ 1550.835782][T21622] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1550.845457][T21621] bridge0: port 1(bridge_slave_0) entered blocking state [ 1550.856958][T21621] bridge0: port 1(bridge_slave_0) entered disabled state [ 1550.864724][T21621] device bridge_slave_0 entered promiscuous mode [ 1550.872256][T21621] bridge0: port 2(bridge_slave_1) entered blocking state [ 1550.879883][T21621] bridge0: port 2(bridge_slave_1) entered disabled state [ 1550.887801][T21621] device bridge_slave_1 entered promiscuous mode [ 1550.908822][T21622] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1550.975400][T21620] device hsr_slave_0 entered promiscuous mode [ 1551.032980][T21620] device hsr_slave_1 entered promiscuous mode [ 1551.097035][T21615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1551.116394][T21622] team0: Port device team_slave_0 added [ 1551.123744][T21622] team0: Port device team_slave_1 added [ 1551.153441][T21621] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1551.184727][T21622] device hsr_slave_0 entered promiscuous mode [ 1551.222730][T21622] device hsr_slave_1 entered promiscuous mode [ 1551.272706][T21622] debugfs: Directory 'hsr0' with parent '/' already present! [ 1551.287788][T21615] 8021q: adding VLAN 0 to HW filter on device team0 [ 1551.296744][T21621] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1551.368171][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1551.376277][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1551.526845][T21621] team0: Port device team_slave_0 added [ 1551.540388][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1551.550258][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1551.559356][ T8743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1551.566472][ T8743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1551.574894][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1551.583650][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1551.592050][ T8743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1551.599159][ T8743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1551.607205][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1551.616807][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1551.626826][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1551.635733][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1551.644948][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1551.654015][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1551.669573][T21615] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1551.680182][T21615] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1551.693967][T21621] team0: Port device team_slave_1 added [ 1551.700584][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1551.709400][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1551.717905][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1551.735571][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1551.750765][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1551.759466][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1551.810053][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1551.829670][T21615] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1551.885497][T21621] device hsr_slave_0 entered promiscuous mode [ 1551.942916][T21621] device hsr_slave_1 entered promiscuous mode [ 1551.993076][T21621] debugfs: Directory 'hsr0' with parent '/' already present! [ 1552.017738][T21620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1552.062744][T21620] 8021q: adding VLAN 0 to HW filter on device team0 [ 1552.070949][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1552.080169][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1552.123086][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1552.131602][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1552.140982][ T8762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1552.148098][ T8762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1552.156818][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1552.166489][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1552.199557][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1552.206700][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1552.262291][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1552.271362][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1552.286046][T21622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1552.321598][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1552.332042][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1552.363318][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1552.371855][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1552.383083][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1552.391872][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1552.407940][T21620] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1552.419458][T21620] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1552.445075][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1552.456021][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1552.467441][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1552.482046][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1552.490703][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1552.505853][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1552.518508][T21622] 8021q: adding VLAN 0 to HW filter on device team0 [ 1552.819069][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1552.841496][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1552.850194][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1552.859364][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1552.866473][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1552.874859][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1552.883571][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1552.891820][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 1552.898899][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1552.906723][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1552.916971][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1552.956934][T21620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1552.974376][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1552.988738][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1553.013434][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1553.021939][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1553.040450][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1553.050006][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1553.059044][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1553.075184][T21622] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1553.090900][T21622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1553.100976][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1553.109116][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1553.117650][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1553.135707][T21621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1553.160643][T21622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1553.172160][T21621] 8021q: adding VLAN 0 to HW filter on device team0 [ 1553.182527][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1553.206381][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1553.249402][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1553.272969][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1553.281284][ T8762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1553.288386][ T8762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1553.326064][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1553.335178][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1553.344125][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1553.351176][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1553.359259][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1553.376549][T21643] bridge0: port 2(bridge_slave_1) entered disabled state [ 1553.385670][T21643] bridge0: port 1(bridge_slave_0) entered disabled state 07:37:12 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:12 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500f000"], 0x48}}, 0x0) 07:37:12 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5004000"], 0x48}}, 0x0) 07:37:12 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1554.083935][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1554.091918][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1554.150200][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1554.185287][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 07:37:12 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000a"], 0x48}}, 0x0) [ 1554.216548][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1554.284668][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1554.352084][T21621] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1554.423086][T21621] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1554.500198][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1554.511799][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1554.551882][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1554.577856][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1554.625754][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1554.985768][T21660] bridge0: port 2(bridge_slave_1) entered disabled state [ 1554.995505][T21660] bridge0: port 1(bridge_slave_0) entered disabled state [ 1555.310221][T21621] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1555.343320][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1555.765937][T21671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1555.773210][T21671] bridge0: port 1(bridge_slave_0) entered disabled state 07:37:14 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:14 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000e"], 0x48}}, 0x0) 07:37:14 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5006000"], 0x48}}, 0x0) 07:37:14 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:14 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:14 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:14 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000f"], 0x48}}, 0x0) 07:37:14 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:14 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5009e00"], 0x48}}, 0x0) 07:37:14 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000040"], 0x48}}, 0x0) [ 1556.757838][T21688] IPVS: ftp: loaded support on port[0] = 21 [ 1557.995535][T21688] chnl_net:caif_netlink_parms(): no params data found [ 1558.240316][T21688] bridge0: port 1(bridge_slave_0) entered blocking state [ 1558.249871][T21688] bridge0: port 1(bridge_slave_0) entered disabled state [ 1558.258269][T21688] device bridge_slave_0 entered promiscuous mode [ 1558.259416][T21697] IPVS: ftp: loaded support on port[0] = 21 [ 1558.271195][T21688] bridge0: port 2(bridge_slave_1) entered blocking state [ 1558.278848][T21688] bridge0: port 2(bridge_slave_1) entered disabled state [ 1558.287276][T21688] device bridge_slave_1 entered promiscuous mode [ 1558.311383][T21688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1558.324706][T21688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1558.550485][T21688] team0: Port device team_slave_0 added [ 1558.564994][T21688] team0: Port device team_slave_1 added [ 1558.875519][T21688] device hsr_slave_0 entered promiscuous mode [ 1558.892953][T21688] device hsr_slave_1 entered promiscuous mode [ 1558.942606][T21688] debugfs: Directory 'hsr0' with parent '/' already present! [ 1559.165427][T21699] IPVS: ftp: loaded support on port[0] = 21 [ 1559.446145][T21697] chnl_net:caif_netlink_parms(): no params data found [ 1559.704348][T21697] bridge0: port 1(bridge_slave_0) entered blocking state [ 1559.711433][T21697] bridge0: port 1(bridge_slave_0) entered disabled state [ 1559.723693][T21697] device bridge_slave_0 entered promiscuous mode [ 1559.748773][T21697] bridge0: port 2(bridge_slave_1) entered blocking state [ 1559.756665][T21697] bridge0: port 2(bridge_slave_1) entered disabled state [ 1559.769077][T21697] device bridge_slave_1 entered promiscuous mode [ 1559.799675][ T2414] device bridge_slave_1 left promiscuous mode [ 1559.806854][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1559.867456][ T2414] device bridge_slave_0 left promiscuous mode [ 1559.873807][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1559.924563][ T2414] device bridge_slave_1 left promiscuous mode [ 1559.930726][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1559.983501][ T2414] device bridge_slave_0 left promiscuous mode [ 1559.989712][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1560.044577][ T2414] device bridge_slave_1 left promiscuous mode [ 1560.050801][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1560.113202][ T2414] device bridge_slave_0 left promiscuous mode [ 1560.119369][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1565.663134][ T2414] device hsr_slave_0 left promiscuous mode [ 1565.702676][ T2414] device hsr_slave_1 left promiscuous mode [ 1565.779604][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1565.792672][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1565.804157][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1565.850377][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1565.940425][ T2414] bond0 (unregistering): Released all slaves [ 1566.083359][ T2414] device hsr_slave_0 left promiscuous mode [ 1566.122785][ T2414] device hsr_slave_1 left promiscuous mode [ 1566.171015][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1566.185042][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1566.197787][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1566.259387][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1566.349716][ T2414] bond0 (unregistering): Released all slaves [ 1566.513393][ T2414] device hsr_slave_0 left promiscuous mode [ 1566.582526][ T2414] device hsr_slave_1 left promiscuous mode [ 1566.650084][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1566.664116][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1566.675185][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1566.758959][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1566.849936][ T2414] bond0 (unregistering): Released all slaves [ 1566.948972][T21699] chnl_net:caif_netlink_parms(): no params data found [ 1566.974017][T21688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1566.998395][T21697] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1567.015056][T21697] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1567.046053][T21697] team0: Port device team_slave_0 added [ 1567.056483][T21697] team0: Port device team_slave_1 added [ 1567.067921][T21699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1567.075080][T21699] bridge0: port 1(bridge_slave_0) entered disabled state [ 1567.083215][T21699] device bridge_slave_0 entered promiscuous mode [ 1567.091346][T21699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1567.098654][T21699] bridge0: port 2(bridge_slave_1) entered disabled state [ 1567.107094][T21699] device bridge_slave_1 entered promiscuous mode [ 1567.115359][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1567.123306][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1567.132720][T21688] 8021q: adding VLAN 0 to HW filter on device team0 [ 1567.184474][T21697] device hsr_slave_0 entered promiscuous mode [ 1567.242851][T21697] device hsr_slave_1 entered promiscuous mode [ 1567.294767][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1567.303998][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1567.312272][T16975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1567.319349][T16975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1567.343210][T21699] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1567.360896][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1567.369775][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1567.378996][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1567.388271][T15184] bridge0: port 2(bridge_slave_1) entered blocking state [ 1567.395356][T15184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1567.404036][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1567.412588][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1567.421018][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1567.429569][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1567.438085][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1567.447328][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1567.465679][T21699] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1567.487315][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1567.496071][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1567.507310][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1567.515673][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1567.524200][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1567.533816][T21688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1567.543174][T21699] team0: Port device team_slave_0 added [ 1567.564697][T21699] team0: Port device team_slave_1 added [ 1567.586355][T21688] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1567.667014][T21699] device hsr_slave_0 entered promiscuous mode [ 1567.743841][T21699] device hsr_slave_1 entered promiscuous mode [ 1567.782467][T21699] debugfs: Directory 'hsr0' with parent '/' already present! [ 1567.902142][T21699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1567.909265][T21699] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1567.916645][T21699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1567.923712][T21699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1567.960076][T21697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1567.973351][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1567.992615][T16975] bridge0: port 1(bridge_slave_0) entered disabled state [ 1568.000581][T16975] bridge0: port 2(bridge_slave_1) entered disabled state [ 1568.069933][T21697] 8021q: adding VLAN 0 to HW filter on device team0 [ 1568.085300][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1568.097102][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1568.136574][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1568.153052][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1568.161445][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1568.168601][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 07:37:26 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:26 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500f000"], 0x48}}, 0x0) 07:37:26 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000060"], 0x48}}, 0x0) 07:37:26 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1568.184970][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1568.209133][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1568.222217][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1568.229332][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1568.321087][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:37:26 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5004003"], 0x48}}, 0x0) 07:37:27 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000a5"], 0x48}}, 0x0) [ 1568.986811][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1569.000514][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1569.030858][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1569.056610][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1569.106771][T21699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1569.156543][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1569.173233][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1569.212330][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1569.220974][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1569.271127][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1569.299961][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1569.320662][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1569.332217][T21697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1569.358858][T21699] 8021q: adding VLAN 0 to HW filter on device team0 [ 1569.379149][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1569.387871][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1569.414912][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1569.424243][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1569.435008][ T2998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1569.442067][ T2998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1569.450448][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1569.459865][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1569.468869][ T2998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1569.475972][ T2998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1569.484905][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1569.499931][T21697] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1569.515105][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1569.533809][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1569.546214][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1569.555113][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1569.565331][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1569.574237][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1569.583187][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1569.595634][T21699] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1569.608051][T21699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1569.625651][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1569.634419][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1569.643542][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1569.668212][T21699] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1569.842128][T21736] bridge0: port 2(bridge_slave_1) entered disabled state [ 1569.851490][T21736] bridge0: port 1(bridge_slave_0) entered disabled state 07:37:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)={[{@grpquota='grpquota'}]}) 07:37:29 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000340"], 0x48}}, 0x0) 07:37:29 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) [ 1570.624933][T21741] bridge0: port 2(bridge_slave_1) entered disabled state [ 1570.634053][T21741] bridge0: port 1(bridge_slave_0) entered disabled state 07:37:29 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:29 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b000000000080", 0x10, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:29 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5fffff0"], 0x48}}, 0x0) 07:37:29 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000040"], 0x48}}, 0x0) 07:37:30 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1571.568184][T21745] IPVS: ftp: loaded support on port[0] = 21 07:37:30 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000003"], 0x48}}, 0x0) [ 1572.102991][T21745] chnl_net:caif_netlink_parms(): no params data found [ 1572.177533][T21745] bridge0: port 1(bridge_slave_0) entered blocking state [ 1572.185371][T21745] bridge0: port 1(bridge_slave_0) entered disabled state [ 1572.201090][T21745] device bridge_slave_0 entered promiscuous mode [ 1572.209704][T21745] bridge0: port 2(bridge_slave_1) entered blocking state [ 1572.217277][T21745] bridge0: port 2(bridge_slave_1) entered disabled state [ 1572.225614][T21745] device bridge_slave_1 entered promiscuous mode [ 1572.247906][T21745] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1572.259682][T21745] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1572.278275][T21745] team0: Port device team_slave_0 added [ 1572.286425][T21745] team0: Port device team_slave_1 added [ 1572.335220][T21745] device hsr_slave_0 entered promiscuous mode [ 1572.372789][T21745] device hsr_slave_1 entered promiscuous mode [ 1572.423420][T21745] debugfs: Directory 'hsr0' with parent '/' already present! [ 1572.438410][T21745] bridge0: port 2(bridge_slave_1) entered blocking state [ 1572.445653][T21745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1572.453072][T21745] bridge0: port 1(bridge_slave_0) entered blocking state [ 1572.460116][T21745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1572.496982][T21745] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1572.509282][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1572.518665][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1572.528223][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1573.129902][T21745] 8021q: adding VLAN 0 to HW filter on device team0 [ 1573.147187][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1573.156519][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1573.165852][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1573.172950][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1573.192248][T21773] IPVS: ftp: loaded support on port[0] = 21 [ 1573.459047][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1573.470041][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1573.478502][T16975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1573.485590][T16975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1573.495731][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1573.504503][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1573.513222][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1573.521628][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1573.532617][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1573.540337][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1573.549924][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1573.848336][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1573.857851][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1574.147950][T21745] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1574.160279][T21745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1574.169357][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1574.177612][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1574.469741][T21745] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1574.803741][T21773] chnl_net:caif_netlink_parms(): no params data found [ 1575.125291][T21773] bridge0: port 1(bridge_slave_0) entered blocking state [ 1575.132486][T21773] bridge0: port 1(bridge_slave_0) entered disabled state [ 1575.140088][T21773] device bridge_slave_0 entered promiscuous mode [ 1575.148601][T21773] bridge0: port 2(bridge_slave_1) entered blocking state [ 1575.155717][T21773] bridge0: port 2(bridge_slave_1) entered disabled state [ 1575.167236][T21773] device bridge_slave_1 entered promiscuous mode [ 1575.521609][T21782] bridge0: port 2(bridge_slave_1) entered disabled state [ 1575.528947][T21782] bridge0: port 1(bridge_slave_0) entered disabled state 07:37:34 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:34 executing program 2: [ 1575.615511][T21773] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 07:37:34 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b000000000080", 0x10, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:34 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:37:34 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500ffff"], 0x48}}, 0x0) 07:37:34 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1576.466662][T21773] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1576.818575][ T2414] device bridge_slave_1 left promiscuous mode [ 1576.835191][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1576.886392][ T2414] device bridge_slave_0 left promiscuous mode [ 1576.905580][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1576.967539][ T2414] device bridge_slave_1 left promiscuous mode [ 1576.982630][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.046566][ T2414] device bridge_slave_0 left promiscuous mode [ 1577.066691][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1577.134442][ T2414] device bridge_slave_1 left promiscuous mode [ 1577.140623][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.194397][ T2414] device bridge_slave_0 left promiscuous mode [ 1577.200557][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1577.255529][ T2414] device bridge_slave_1 left promiscuous mode [ 1577.261685][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1577.303288][ T2414] device bridge_slave_0 left promiscuous mode [ 1577.309426][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1584.693088][ T2414] device hsr_slave_0 left promiscuous mode [ 1584.732674][ T2414] device hsr_slave_1 left promiscuous mode [ 1584.784498][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1584.797252][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1584.808104][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1584.857330][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1584.979619][ T2414] bond0 (unregistering): Released all slaves [ 1585.133179][ T2414] device hsr_slave_0 left promiscuous mode [ 1585.192509][ T2414] device hsr_slave_1 left promiscuous mode [ 1585.255096][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1585.268125][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1585.278695][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1585.328974][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1585.397816][ T2414] bond0 (unregistering): Released all slaves [ 1585.583148][ T2414] device hsr_slave_0 left promiscuous mode [ 1585.632614][ T2414] device hsr_slave_1 left promiscuous mode [ 1585.680115][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1585.693366][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1585.705635][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1585.758605][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1585.851862][ T2414] bond0 (unregistering): Released all slaves [ 1586.033857][ T2414] device hsr_slave_0 left promiscuous mode [ 1586.072684][ T2414] device hsr_slave_1 left promiscuous mode [ 1586.120092][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1586.133379][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1586.145613][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1586.218080][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1586.310156][ T2414] bond0 (unregistering): Released all slaves [ 1586.409116][T21773] team0: Port device team_slave_0 added [ 1586.421926][T21797] IPVS: ftp: loaded support on port[0] = 21 [ 1586.424011][T21773] team0: Port device team_slave_1 added [ 1586.454246][T21799] IPVS: ftp: loaded support on port[0] = 21 [ 1586.535401][T21773] device hsr_slave_0 entered promiscuous mode [ 1586.572867][T21773] device hsr_slave_1 entered promiscuous mode [ 1586.734954][T21799] chnl_net:caif_netlink_parms(): no params data found [ 1586.787333][T21799] bridge0: port 1(bridge_slave_0) entered blocking state [ 1586.794773][T21799] bridge0: port 1(bridge_slave_0) entered disabled state [ 1586.802510][T21799] device bridge_slave_0 entered promiscuous mode [ 1586.821684][T21797] chnl_net:caif_netlink_parms(): no params data found [ 1586.845909][T21799] bridge0: port 2(bridge_slave_1) entered blocking state [ 1586.853230][T21799] bridge0: port 2(bridge_slave_1) entered disabled state [ 1586.860772][T21799] device bridge_slave_1 entered promiscuous mode [ 1586.887389][T21799] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1586.905182][T21799] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1586.916474][T21797] bridge0: port 1(bridge_slave_0) entered blocking state [ 1586.926589][T21797] bridge0: port 1(bridge_slave_0) entered disabled state [ 1586.935408][T21797] device bridge_slave_0 entered promiscuous mode [ 1586.943142][T21797] bridge0: port 2(bridge_slave_1) entered blocking state [ 1586.950185][T21797] bridge0: port 2(bridge_slave_1) entered disabled state [ 1586.958255][T21797] device bridge_slave_1 entered promiscuous mode [ 1586.990346][T21797] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1587.008143][T21797] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1587.028415][T21799] team0: Port device team_slave_0 added [ 1587.036136][T21799] team0: Port device team_slave_1 added [ 1587.047496][T21773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1587.059971][T21797] team0: Port device team_slave_0 added [ 1587.080206][T21797] team0: Port device team_slave_1 added [ 1587.166035][T21799] device hsr_slave_0 entered promiscuous mode [ 1587.232855][T21799] device hsr_slave_1 entered promiscuous mode [ 1587.302451][T21799] debugfs: Directory 'hsr0' with parent '/' already present! [ 1587.456870][T21773] 8021q: adding VLAN 0 to HW filter on device team0 [ 1587.525237][T21797] device hsr_slave_0 entered promiscuous mode [ 1587.569665][T21797] device hsr_slave_1 entered promiscuous mode [ 1587.612444][T21797] debugfs: Directory 'hsr0' with parent '/' already present! [ 1587.631772][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1587.639649][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1587.676987][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1587.693749][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1587.702172][T15287] bridge0: port 1(bridge_slave_0) entered blocking state [ 1587.709271][T15287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1587.725555][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1587.738551][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1587.749540][T15287] bridge0: port 2(bridge_slave_1) entered blocking state [ 1587.756632][T15287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1587.770751][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1587.814091][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1587.822074][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1587.831169][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1587.840892][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1587.853229][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1587.872493][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1587.881565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1587.910455][T21773] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1587.921873][T21773] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1587.943278][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1587.951620][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1587.960792][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1587.969728][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1587.979034][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1588.010349][T21773] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1588.029973][T21799] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1588.081085][T21797] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1588.089211][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1588.104955][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1588.121286][T21799] 8021q: adding VLAN 0 to HW filter on device team0 [ 1588.140516][T21797] 8021q: adding VLAN 0 to HW filter on device team0 [ 1588.156968][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1588.169603][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1588.204004][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1588.213218][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1588.221646][T15184] bridge0: port 1(bridge_slave_0) entered blocking state [ 1588.228760][T15184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1588.238087][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1588.255427][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1588.269840][T15184] bridge0: port 2(bridge_slave_1) entered blocking state [ 1588.276948][T15184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1588.285519][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1588.294292][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1588.303402][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1588.312008][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1588.320734][T15184] bridge0: port 1(bridge_slave_0) entered blocking state [ 1588.327819][T15184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1588.336500][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1588.345180][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1588.353973][T15184] bridge0: port 2(bridge_slave_1) entered blocking state [ 1588.361020][T15184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1588.368965][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1588.405650][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1588.425378][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1588.451057][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 07:37:47 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:37:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:37:47 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x8, "6aa0d8a3430df333"}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1588.488648][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1588.497183][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1588.506599][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1588.516663][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1588.525509][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1588.559901][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1588.598629][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1588.607530][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1588.638759][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1588.666328][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1588.695496][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1588.714938][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1588.747278][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1588.763293][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1588.775672][T21797] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1588.803652][T21797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1588.824290][T21799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:37:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:37:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:37:47 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1589.229445][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1589.237295][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1589.248021][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1589.257046][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1589.312212][T21799] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1589.346361][T21797] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1589.578157][T21834] bridge0: port 2(bridge_slave_1) entered disabled state [ 1589.587410][T21834] bridge0: port 1(bridge_slave_0) entered disabled state 07:37:48 executing program 2: 07:37:48 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:48 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b000000000080", 0x10, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:48 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:37:48 executing program 2: 07:37:48 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:37:49 executing program 2: [ 1590.433523][T21843] IPVS: ftp: loaded support on port[0] = 21 07:37:49 executing program 2: [ 1591.373200][T21843] chnl_net:caif_netlink_parms(): no params data found [ 1591.409272][T21843] bridge0: port 1(bridge_slave_0) entered blocking state [ 1591.416787][T21843] bridge0: port 1(bridge_slave_0) entered disabled state [ 1591.424823][T21843] device bridge_slave_0 entered promiscuous mode [ 1591.434005][T21843] bridge0: port 2(bridge_slave_1) entered blocking state [ 1591.441073][T21843] bridge0: port 2(bridge_slave_1) entered disabled state [ 1591.448865][T21843] device bridge_slave_1 entered promiscuous mode [ 1591.466165][T21843] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1591.478178][T21843] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1591.498107][T21843] team0: Port device team_slave_0 added [ 1591.505340][T21843] team0: Port device team_slave_1 added [ 1591.575243][T21843] device hsr_slave_0 entered promiscuous mode [ 1591.614310][T21843] device hsr_slave_1 entered promiscuous mode [ 1591.672484][T21843] debugfs: Directory 'hsr0' with parent '/' already present! [ 1591.692190][T21843] bridge0: port 2(bridge_slave_1) entered blocking state [ 1591.699290][T21843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1591.706660][T21843] bridge0: port 1(bridge_slave_0) entered blocking state [ 1591.713773][T21843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1591.751898][T21843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1591.765368][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1591.793601][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 1591.801797][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 1591.818943][T21843] 8021q: adding VLAN 0 to HW filter on device team0 [ 1591.829226][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1591.837791][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1591.844893][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1591.864649][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1591.873534][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1591.880566][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1591.889228][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1591.898161][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1591.907083][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1592.345701][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1592.358396][T21843] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1592.373773][T21843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1592.381967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1592.391768][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1592.640874][T21860] IPVS: ftp: loaded support on port[0] = 21 [ 1592.642210][T21843] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1593.233646][T21869] bridge0: port 2(bridge_slave_1) entered disabled state [ 1593.241012][T21869] bridge0: port 1(bridge_slave_0) entered disabled state 07:37:51 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x8, "6aa0d8a3430df333"}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:51 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000", 0x11, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:37:51 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:37:51 executing program 2: 07:37:51 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1594.090362][T21860] chnl_net:caif_netlink_parms(): no params data found [ 1594.510934][T21860] bridge0: port 1(bridge_slave_0) entered blocking state [ 1594.518974][T21860] bridge0: port 1(bridge_slave_0) entered disabled state [ 1594.527284][T21860] device bridge_slave_0 entered promiscuous mode [ 1594.535877][T21860] bridge0: port 2(bridge_slave_1) entered blocking state [ 1594.543406][T21860] bridge0: port 2(bridge_slave_1) entered disabled state [ 1594.551286][T21860] device bridge_slave_1 entered promiscuous mode [ 1594.798066][T21860] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1594.809659][T21860] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1594.830868][T21860] team0: Port device team_slave_0 added [ 1595.084254][T21860] team0: Port device team_slave_1 added [ 1595.148197][T21860] device hsr_slave_0 entered promiscuous mode [ 1595.202830][T21860] device hsr_slave_1 entered promiscuous mode [ 1595.262530][T21860] debugfs: Directory 'hsr0' with parent '/' already present! [ 1595.487431][T21882] IPVS: ftp: loaded support on port[0] = 21 [ 1595.525430][ T2414] device bridge_slave_1 left promiscuous mode [ 1595.531601][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1595.573879][ T2414] device bridge_slave_0 left promiscuous mode [ 1595.580054][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1595.638120][ T2414] device bridge_slave_1 left promiscuous mode [ 1595.645205][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1595.703537][ T2414] device bridge_slave_0 left promiscuous mode [ 1595.709750][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1595.754514][ T2414] device bridge_slave_1 left promiscuous mode [ 1595.760677][ T2414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1595.803388][ T2414] device bridge_slave_0 left promiscuous mode [ 1595.809550][ T2414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1601.312955][ T2414] device hsr_slave_0 left promiscuous mode [ 1601.352542][ T2414] device hsr_slave_1 left promiscuous mode [ 1601.424281][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1601.436741][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1601.447187][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1601.510001][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1601.610270][ T2414] bond0 (unregistering): Released all slaves [ 1601.773605][ T2414] device hsr_slave_0 left promiscuous mode [ 1601.832675][ T2414] device hsr_slave_1 left promiscuous mode [ 1601.904822][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1601.917765][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1601.929715][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1601.980078][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1602.070954][ T2414] bond0 (unregistering): Released all slaves [ 1602.243341][ T2414] device hsr_slave_0 left promiscuous mode [ 1602.312467][ T2414] device hsr_slave_1 left promiscuous mode [ 1602.400340][ T2414] team0 (unregistering): Port device team_slave_1 removed [ 1602.415039][ T2414] team0 (unregistering): Port device team_slave_0 removed [ 1602.425958][ T2414] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1602.466890][ T2414] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1602.554285][ T2414] bond0 (unregistering): Released all slaves [ 1602.721503][T21882] chnl_net:caif_netlink_parms(): no params data found [ 1602.751799][T21860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1602.773092][T21860] 8021q: adding VLAN 0 to HW filter on device team0 [ 1602.788779][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1602.801533][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1602.812238][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1602.822034][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1602.831591][T21134] bridge0: port 1(bridge_slave_0) entered blocking state [ 1602.838676][T21134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1602.846691][T21882] bridge0: port 1(bridge_slave_0) entered blocking state [ 1602.854410][T21882] bridge0: port 1(bridge_slave_0) entered disabled state [ 1602.861954][T21882] device bridge_slave_0 entered promiscuous mode [ 1602.875151][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1602.883194][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1602.891596][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1602.900004][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 1602.907058][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1602.916892][T21882] bridge0: port 2(bridge_slave_1) entered blocking state [ 1602.928837][T21882] bridge0: port 2(bridge_slave_1) entered disabled state [ 1602.938514][T21882] device bridge_slave_1 entered promiscuous mode [ 1602.960861][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1602.969424][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1602.978329][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1602.987085][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1603.000658][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1603.013444][T21882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1603.030344][T21882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1603.040499][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1603.049395][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1603.075588][T21860] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1603.086701][T21860] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1603.098588][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1603.107095][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1603.115943][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1603.124615][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1603.133142][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1603.141670][T21882] team0: Port device team_slave_0 added [ 1603.149931][T21882] team0: Port device team_slave_1 added [ 1603.180025][T21860] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1603.215353][T21882] device hsr_slave_0 entered promiscuous mode [ 1603.252973][T21882] device hsr_slave_1 entered promiscuous mode [ 1603.307454][T21882] bridge0: port 2(bridge_slave_1) entered blocking state [ 1603.314566][T21882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1603.321877][T21882] bridge0: port 1(bridge_slave_0) entered blocking state [ 1603.328989][T21882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1603.552827][T21882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1603.584916][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1603.594397][T21134] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:02 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:02 executing program 2: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2001, 0x0) splice(r0, 0x0, r4, 0x0, 0x4, 0x0) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x1c9c380}, {}, {}, @raw8={"93bb246d62dd6e7776e86868"}}], 0x30) 07:38:02 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:02 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:02 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x8, "6aa0d8a3430df333"}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1603.602973][T21134] bridge0: port 2(bridge_slave_1) entered disabled state [ 1603.618538][T21882] 8021q: adding VLAN 0 to HW filter on device team0 [ 1603.688028][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1603.707055][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:38:02 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1603.736454][ T2998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1603.743597][ T2998] bridge0: port 1(bridge_slave_0) entered forwarding state 07:38:02 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:02 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1604.526071][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1604.550732][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 07:38:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1604.570904][T14674] bridge0: port 2(bridge_slave_1) entered blocking state [ 1604.578043][T14674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1604.612296][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 07:38:03 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(0x0, 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1604.651793][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1604.698267][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1604.710677][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 07:38:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp6\x00') sendfile(r0, r1, 0x0, 0xfffc) [ 1604.739550][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1604.783803][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1604.844754][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1604.855031][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1604.870229][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1604.880518][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1604.896659][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1604.910531][T21882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1604.949322][T21882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1605.259780][T21931] bridge0: port 2(bridge_slave_1) entered disabled state [ 1605.269009][T21931] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:04 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000", 0x11, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:04 executing program 2: r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0xfffffffffffffffa, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x20000000}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) shutdown(r0, 0x2) 07:38:04 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(0x0, 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:04 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:04 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5ffffff"], 0x48}}, 0x0) [ 1605.948743][T21934] IPVS: ftp: loaded support on port[0] = 21 [ 1606.267652][T21934] chnl_net:caif_netlink_parms(): no params data found [ 1606.926732][T21934] bridge0: port 1(bridge_slave_0) entered blocking state [ 1606.960712][T21934] bridge0: port 1(bridge_slave_0) entered disabled state [ 1606.979928][T21934] device bridge_slave_0 entered promiscuous mode [ 1606.988374][T21934] bridge0: port 2(bridge_slave_1) entered blocking state [ 1607.002950][T21934] bridge0: port 2(bridge_slave_1) entered disabled state [ 1607.014167][T21934] device bridge_slave_1 entered promiscuous mode [ 1607.054428][T21934] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1607.071061][T21934] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1607.112002][T21934] team0: Port device team_slave_0 added [ 1607.119475][T21934] team0: Port device team_slave_1 added [ 1607.194403][T21934] device hsr_slave_0 entered promiscuous mode [ 1607.243105][T21934] device hsr_slave_1 entered promiscuous mode [ 1607.312603][T21934] debugfs: Directory 'hsr0' with parent '/' already present! [ 1607.360374][T21934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1607.373274][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1607.383225][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1607.390786][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1607.400754][T21934] 8021q: adding VLAN 0 to HW filter on device team0 [ 1607.410361][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1607.419476][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1607.429884][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1607.437002][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1607.445510][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1607.458814][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1607.467845][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1607.476337][ T2998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1607.483424][ T2998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1607.505131][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1607.523620][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1607.531699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1607.540832][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1607.549999][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1607.560001][T21934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1607.584450][T21934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1607.755110][T21956] bridge0: port 2(bridge_slave_1) entered disabled state [ 1607.764454][T21956] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:07 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xc, "6aa0d8a3430df333d742644b"}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:07 executing program 2: unshare(0x20400) r0 = socket(0x400000000000010, 0x802, 0x0) getpeername$ax25(r0, 0x0, &(0x7f00000000c0)) 07:38:07 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5ffffff"], 0x48}}, 0x0) 07:38:07 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500ffff"], 0x48}}, 0x0) 07:38:07 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000", 0x11, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:07 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500f0ff"], 0x48}}, 0x0) 07:38:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000003a00)={0x0, 0x2, &(0x7f00000039c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000160001080000000000000000020000000800020000000001c769ab8c4ea5506333afa5374c2d22475bc30e94361f9e4f7af37351a3713b32f7f8b29dda730200000037df3133d545a9e12f540600e5c59d777179e4a398910e30ad56bbc9015835a8da1d8f9738d6696d151b3196c0b52998dcdf658d70a2a00411a217d903b10bdb0054833990c62ca0a7fc658fbcd188fa5908a923c412cdbe3f9616ff38124ab6c9ebcc09f621e66210c83d81d8eca3fee344b7deab55415a30ae21d61353c5d32b8f1400a19d"], 0x1c}}, 0x0) 07:38:07 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:07 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@multicast2, @in=@multicast1}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf31ee8229798a588}, {{@in6=@loopback}, 0x0, @in6=@empty}}, 0xe8) [ 1609.500153][T21959] IPVS: ftp: loaded support on port[0] = 21 [ 1610.179792][T21959] chnl_net:caif_netlink_parms(): no params data found [ 1610.465865][T21989] IPVS: ftp: loaded support on port[0] = 21 [ 1610.481041][T21959] bridge0: port 1(bridge_slave_0) entered blocking state [ 1610.489225][T21959] bridge0: port 1(bridge_slave_0) entered disabled state [ 1610.497304][T21959] device bridge_slave_0 entered promiscuous mode [ 1610.505567][T21959] bridge0: port 2(bridge_slave_1) entered blocking state [ 1610.516241][T21959] bridge0: port 2(bridge_slave_1) entered disabled state [ 1610.525603][T21959] device bridge_slave_1 entered promiscuous mode [ 1610.558267][T21959] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1610.780924][T21959] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1610.810543][T21959] team0: Port device team_slave_0 added [ 1610.820635][T21959] team0: Port device team_slave_1 added [ 1611.099457][T21959] device hsr_slave_0 entered promiscuous mode [ 1611.132763][T21959] device hsr_slave_1 entered promiscuous mode [ 1611.192648][T21959] debugfs: Directory 'hsr0' with parent '/' already present! [ 1611.654677][T21989] chnl_net:caif_netlink_parms(): no params data found [ 1611.691878][T21989] bridge0: port 1(bridge_slave_0) entered blocking state [ 1611.700001][T21989] bridge0: port 1(bridge_slave_0) entered disabled state [ 1611.708196][T21989] device bridge_slave_0 entered promiscuous mode [ 1611.716839][T21989] bridge0: port 2(bridge_slave_1) entered blocking state [ 1611.724611][T21989] bridge0: port 2(bridge_slave_1) entered disabled state [ 1611.732201][T21989] device bridge_slave_1 entered promiscuous mode [ 1611.753758][T21989] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1611.976598][T21989] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1612.000854][T21989] team0: Port device team_slave_0 added [ 1612.015226][T21989] team0: Port device team_slave_1 added [ 1612.024940][T10647] device bridge_slave_1 left promiscuous mode [ 1612.031241][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1612.083522][T10647] device bridge_slave_0 left promiscuous mode [ 1612.089704][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1612.144430][T10647] device bridge_slave_1 left promiscuous mode [ 1612.150648][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1612.193674][T10647] device bridge_slave_0 left promiscuous mode [ 1612.199844][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1612.244644][T10647] device bridge_slave_1 left promiscuous mode [ 1612.250820][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1612.293673][T10647] device bridge_slave_0 left promiscuous mode [ 1612.299846][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1617.973042][T10647] device hsr_slave_0 left promiscuous mode [ 1618.012633][T10647] device hsr_slave_1 left promiscuous mode [ 1618.071855][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1618.085100][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1618.097761][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1618.138529][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1618.230506][T10647] bond0 (unregistering): Released all slaves [ 1618.393216][T10647] device hsr_slave_0 left promiscuous mode [ 1618.433582][T10647] device hsr_slave_1 left promiscuous mode [ 1618.486280][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1618.499766][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1618.511181][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1618.569076][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1618.658663][T10647] bond0 (unregistering): Released all slaves [ 1618.783262][T10647] device hsr_slave_0 left promiscuous mode [ 1618.822592][T10647] device hsr_slave_1 left promiscuous mode [ 1618.869919][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1618.883053][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1618.894587][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1618.946231][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1619.049284][T10647] bond0 (unregistering): Released all slaves [ 1619.204157][T21989] device hsr_slave_0 entered promiscuous mode [ 1619.253054][T21989] device hsr_slave_1 entered promiscuous mode [ 1619.324536][T21959] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1619.341575][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1619.349414][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1619.359845][T21959] 8021q: adding VLAN 0 to HW filter on device team0 [ 1619.379403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1619.389108][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1619.398229][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1619.405331][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1619.413449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1619.421887][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1619.430295][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1619.437336][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1619.445135][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1619.462851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1619.471357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1619.480677][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1619.490179][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1619.499683][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1619.521108][T21989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1619.535514][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1619.544251][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1619.552844][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1619.561057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1619.572300][T21959] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1619.583873][T21959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1619.596936][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1619.605710][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1619.617475][T21989] 8021q: adding VLAN 0 to HW filter on device team0 [ 1619.634516][T21959] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1619.641525][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1619.649936][T14674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1619.674232][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1619.683448][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1619.691824][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1619.698900][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1619.712667][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1619.721237][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1619.730162][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1619.737238][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1619.752953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1619.760752][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1619.769683][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1619.778792][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1619.788935][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1619.891286][T21989] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1619.902048][T21989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1619.915640][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1619.924044][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1619.932917][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1619.941129][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1619.951279][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1619.959821][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1619.968228][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1619.976626][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1620.042124][T21989] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1620.189076][T21999] bridge0: port 2(bridge_slave_1) entered disabled state [ 1620.197833][T21999] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:19 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(0x0, 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:19 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d57fffff"], 0x48}}, 0x0) 07:38:19 executing program 2: 07:38:19 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500ffff"], 0x48}}, 0x0) 07:38:19 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xc, "6aa0d8a3430df333d742644b"}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:19 executing program 2: [ 1621.128032][T22010] bridge0: port 2(bridge_slave_1) entered disabled state [ 1621.136822][T22010] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:19 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d59effff"], 0x48}}, 0x0) 07:38:20 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:20 executing program 2: 07:38:20 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) 07:38:20 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5f0ffff"], 0x48}}, 0x0) 07:38:20 executing program 2: 07:38:21 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:21 executing program 2: 07:38:21 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5007fff"], 0x48}}, 0x0) 07:38:21 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1623.322840][T22047] IPVS: ftp: loaded support on port[0] = 21 [ 1623.440797][T22047] chnl_net:caif_netlink_parms(): no params data found [ 1623.485380][T22047] bridge0: port 1(bridge_slave_0) entered blocking state [ 1623.493633][T22047] bridge0: port 1(bridge_slave_0) entered disabled state [ 1623.501214][T22047] device bridge_slave_0 entered promiscuous mode [ 1623.508976][T22047] bridge0: port 2(bridge_slave_1) entered blocking state [ 1623.516408][T22047] bridge0: port 2(bridge_slave_1) entered disabled state [ 1623.524374][T22047] device bridge_slave_1 entered promiscuous mode [ 1623.544343][T22047] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1623.556075][T22047] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1623.574859][T22047] team0: Port device team_slave_0 added [ 1623.581508][T22047] team0: Port device team_slave_1 added [ 1623.645216][T22047] device hsr_slave_0 entered promiscuous mode [ 1623.683266][T22047] device hsr_slave_1 entered promiscuous mode [ 1623.732635][T22047] debugfs: Directory 'hsr0' with parent '/' already present! [ 1623.751695][T22047] bridge0: port 2(bridge_slave_1) entered blocking state [ 1623.758806][T22047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1623.766198][T22047] bridge0: port 1(bridge_slave_0) entered blocking state [ 1623.773278][T22047] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1623.820669][T22047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1623.835395][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1623.843978][T15287] bridge0: port 1(bridge_slave_0) entered disabled state [ 1623.851484][T15287] bridge0: port 2(bridge_slave_1) entered disabled state [ 1623.860042][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1623.874560][T22047] 8021q: adding VLAN 0 to HW filter on device team0 [ 1623.884259][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1623.893236][T20262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1623.900272][T20262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1623.924317][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1623.933094][T15287] bridge0: port 2(bridge_slave_1) entered blocking state [ 1623.940131][T15287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1623.949627][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1623.958528][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1623.967132][T15287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1623.980161][T22047] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1623.995069][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1624.004417][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1624.012056][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1624.030408][T22047] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1624.606453][T22057] bridge0: port 2(bridge_slave_1) entered disabled state [ 1624.613928][T22057] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:23 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xc, "6aa0d8a3430df333d742644b"}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:23 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:23 executing program 2: 07:38:23 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5ffffff"], 0x48}}, 0x0) 07:38:23 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:23 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5009eff"], 0x48}}, 0x0) 07:38:23 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x101012, 0x0) r1 = memfd_create(&(0x7f0000000200)='/dev/dsp\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00bf1802000341"], 0xffffffb9) sendfile(r0, r1, 0x0, 0x7fffffffffffffff) 07:38:23 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500f0ff"], 0x48}}, 0x0) 07:38:23 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:23 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:23 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:24 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500ffff"], 0x48}}, 0x0) 07:38:25 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xe, "6aa0d8a3430df333d742644b2157"}, &(0x7f0000000200)=0x16) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1627.211738][T22096] IPVS: ftp: loaded support on port[0] = 21 [ 1627.485642][T22096] chnl_net:caif_netlink_parms(): no params data found [ 1627.773977][T22096] bridge0: port 1(bridge_slave_0) entered blocking state [ 1627.775084][T22099] IPVS: ftp: loaded support on port[0] = 21 [ 1627.782881][T22096] bridge0: port 1(bridge_slave_0) entered disabled state [ 1627.798842][T22096] device bridge_slave_0 entered promiscuous mode [ 1628.023153][T22096] bridge0: port 2(bridge_slave_1) entered blocking state [ 1628.030236][T22096] bridge0: port 2(bridge_slave_1) entered disabled state [ 1628.037890][T22096] device bridge_slave_1 entered promiscuous mode [ 1628.061656][T22096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1628.082034][T22096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1628.308753][T22096] team0: Port device team_slave_0 added [ 1628.316588][T22096] team0: Port device team_slave_1 added [ 1628.375816][T22096] device hsr_slave_0 entered promiscuous mode [ 1628.402734][T22096] device hsr_slave_1 entered promiscuous mode [ 1628.482611][T22096] debugfs: Directory 'hsr0' with parent '/' already present! [ 1628.517886][T10647] device bridge_slave_1 left promiscuous mode [ 1628.524370][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1628.573091][T10647] device bridge_slave_0 left promiscuous mode [ 1628.579246][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1628.644456][T10647] device bridge_slave_1 left promiscuous mode [ 1628.650643][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1628.684484][T10647] device bridge_slave_0 left promiscuous mode [ 1628.690683][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1628.744427][T10647] device bridge_slave_1 left promiscuous mode [ 1628.750590][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1628.803478][T10647] device bridge_slave_0 left promiscuous mode [ 1628.809656][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1634.242991][T10647] device hsr_slave_0 left promiscuous mode [ 1634.292694][T10647] device hsr_slave_1 left promiscuous mode [ 1634.353199][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1634.365123][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1634.376207][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1634.446752][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1634.549354][T10647] bond0 (unregistering): Released all slaves [ 1634.674221][T10647] device hsr_slave_0 left promiscuous mode [ 1634.722583][T10647] device hsr_slave_1 left promiscuous mode [ 1634.771706][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1634.785105][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1634.797755][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1634.849114][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1634.941814][T10647] bond0 (unregistering): Released all slaves [ 1635.083253][T10647] device hsr_slave_0 left promiscuous mode [ 1635.122565][T10647] device hsr_slave_1 left promiscuous mode [ 1635.204470][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1635.217102][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1635.228089][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1635.276292][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1635.359824][T10647] bond0 (unregistering): Released all slaves [ 1635.468692][T22099] chnl_net:caif_netlink_parms(): no params data found [ 1635.511565][T22099] bridge0: port 1(bridge_slave_0) entered blocking state [ 1635.520183][T22099] bridge0: port 1(bridge_slave_0) entered disabled state [ 1635.528490][T22099] device bridge_slave_0 entered promiscuous mode [ 1635.536389][T22099] bridge0: port 2(bridge_slave_1) entered blocking state [ 1635.544528][T22099] bridge0: port 2(bridge_slave_1) entered disabled state [ 1635.552211][T22099] device bridge_slave_1 entered promiscuous mode [ 1635.571228][T22099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1635.585872][T22099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1635.608020][T22099] team0: Port device team_slave_0 added [ 1635.615378][T22099] team0: Port device team_slave_1 added [ 1635.685473][T22099] device hsr_slave_0 entered promiscuous mode [ 1635.723762][T22099] device hsr_slave_1 entered promiscuous mode [ 1635.810957][T22099] bridge0: port 2(bridge_slave_1) entered blocking state [ 1635.818081][T22099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1635.825458][T22099] bridge0: port 1(bridge_slave_0) entered blocking state [ 1635.832561][T22099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1635.848772][T22096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1635.864724][ T8743] bridge0: port 1(bridge_slave_0) entered disabled state [ 1635.876003][ T8743] bridge0: port 2(bridge_slave_1) entered disabled state [ 1635.885394][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1635.896672][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1635.905779][T22096] 8021q: adding VLAN 0 to HW filter on device team0 [ 1636.072810][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1636.081561][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1636.096570][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1636.103672][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1636.144172][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1636.158689][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1636.170532][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1636.186221][T22049] bridge0: port 2(bridge_slave_1) entered blocking state [ 1636.193340][T22049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1636.208051][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1636.216869][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1636.225976][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1636.234775][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1636.243570][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1636.252177][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1636.267486][T22099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1636.280994][T22096] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1636.292528][T22096] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1636.304728][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1636.320078][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1636.328050][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1636.343159][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1636.351616][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1636.367085][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1636.395870][T22099] 8021q: adding VLAN 0 to HW filter on device team0 [ 1636.406737][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1636.415724][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1636.430729][T22096] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1636.457197][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1636.465684][T15184] bridge0: port 1(bridge_slave_0) entered blocking state [ 1636.472790][T15184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1636.491025][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1636.499643][T15184] bridge0: port 2(bridge_slave_1) entered blocking state [ 1636.506857][T15184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1636.542278][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1636.569638][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1636.598218][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1636.609648][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1636.624967][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1636.638389][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1636.649306][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1636.662204][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1636.680682][T22099] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1636.703631][T22099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1636.711874][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1636.720412][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1636.729068][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1636.751604][T22099] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1636.899836][T22109] bridge0: port 2(bridge_slave_1) entered disabled state [ 1636.909147][T22109] bridge0: port 1(bridge_slave_0) entered disabled state [ 1637.607009][T22115] bridge0: port 2(bridge_slave_1) entered disabled state [ 1637.616212][T22115] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:36 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:36 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:36 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:36 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getitimer(0x0, &(0x7f0000000000)) 07:38:36 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xe, "6aa0d8a3430df333d742644b2157"}, &(0x7f0000000200)=0x16) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:36 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:36 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:36 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:36 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:37 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:37 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:37 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:37 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:37 executing program 2: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") symlinkat(&(0x7f0000000040)='./file0/file0\x00', r0, &(0x7f00000000c0)='./file0\x00') r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000280)='./file0/file0\x00') 07:38:37 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000a00)='reiserfs\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}]}) 07:38:37 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1639.831366][T22166] IPVS: ftp: loaded support on port[0] = 21 [ 1640.029502][T22166] chnl_net:caif_netlink_parms(): no params data found [ 1640.099605][T22166] bridge0: port 1(bridge_slave_0) entered blocking state [ 1640.109219][T22166] bridge0: port 1(bridge_slave_0) entered disabled state [ 1640.127439][T22166] device bridge_slave_0 entered promiscuous mode [ 1640.136136][T22166] bridge0: port 2(bridge_slave_1) entered blocking state [ 1640.143865][T22166] bridge0: port 2(bridge_slave_1) entered disabled state [ 1640.151886][T22166] device bridge_slave_1 entered promiscuous mode [ 1640.175005][T22166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1640.185654][T22166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1640.205892][T22166] team0: Port device team_slave_0 added [ 1640.213449][T22166] team0: Port device team_slave_1 added [ 1640.265585][T22166] device hsr_slave_0 entered promiscuous mode [ 1640.302742][T22166] device hsr_slave_1 entered promiscuous mode [ 1640.342599][T22166] debugfs: Directory 'hsr0' with parent '/' already present! [ 1640.361618][T22166] bridge0: port 2(bridge_slave_1) entered blocking state [ 1640.368727][T22166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1640.376107][T22166] bridge0: port 1(bridge_slave_0) entered blocking state [ 1640.383200][T22166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1640.431332][T22166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1640.446936][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1640.455767][ T8762] bridge0: port 1(bridge_slave_0) entered disabled state [ 1640.463931][ T8762] bridge0: port 2(bridge_slave_1) entered disabled state [ 1640.472034][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1640.483825][T22166] 8021q: adding VLAN 0 to HW filter on device team0 [ 1640.496029][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1640.506139][T20998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1640.513235][T20998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1640.534944][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1640.543542][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 1640.550571][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1640.558681][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1640.567910][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1640.578689][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1640.586760][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1640.600933][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1640.617446][T22166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1640.638478][T22166] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1641.245275][T22175] bridge0: port 2(bridge_slave_1) entered disabled state [ 1641.252687][T22175] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:39 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xe, "6aa0d8a3430df333d742644b2157"}, &(0x7f0000000200)=0x16) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) ioctl$KVM_ENABLE_CAP(r1, 0x4020aea5, &(0x7f0000000240)) 07:38:39 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:39 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:39 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1641.610136][T22178] IPVS: ftp: loaded support on port[0] = 21 07:38:40 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:40 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:40 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:40 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:40 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1642.621510][T22194] bridge0: port 2(bridge_slave_1) entered disabled state [ 1642.630897][T22194] bridge0: port 1(bridge_slave_0) entered disabled state [ 1643.529175][T22211] IPVS: ftp: loaded support on port[0] = 21 [ 1644.024744][T22178] chnl_net:caif_netlink_parms(): no params data found [ 1644.280336][T22178] bridge0: port 1(bridge_slave_0) entered blocking state [ 1644.291124][T22178] bridge0: port 1(bridge_slave_0) entered disabled state [ 1644.298912][T22178] device bridge_slave_0 entered promiscuous mode [ 1644.307036][T22178] bridge0: port 2(bridge_slave_1) entered blocking state [ 1644.314163][T22178] bridge0: port 2(bridge_slave_1) entered disabled state [ 1644.321896][T22178] device bridge_slave_1 entered promiscuous mode [ 1644.349153][T22178] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1644.575906][T22178] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1644.614251][T22211] chnl_net:caif_netlink_parms(): no params data found [ 1644.625418][T22178] team0: Port device team_slave_0 added [ 1644.635021][T22178] team0: Port device team_slave_1 added [ 1644.871728][T22211] bridge0: port 1(bridge_slave_0) entered blocking state [ 1644.879127][T22211] bridge0: port 1(bridge_slave_0) entered disabled state [ 1644.886883][T22211] device bridge_slave_0 entered promiscuous mode [ 1644.901293][T22211] bridge0: port 2(bridge_slave_1) entered blocking state [ 1644.909019][T22211] bridge0: port 2(bridge_slave_1) entered disabled state [ 1644.917444][T22211] device bridge_slave_1 entered promiscuous mode [ 1644.948910][T22211] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1644.962211][T22211] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1645.019095][T22178] device hsr_slave_0 entered promiscuous mode [ 1645.052862][T22178] device hsr_slave_1 entered promiscuous mode [ 1645.092554][T22178] debugfs: Directory 'hsr0' with parent '/' already present! [ 1645.105925][T10647] device bridge_slave_1 left promiscuous mode [ 1645.112110][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1645.163518][T10647] device bridge_slave_0 left promiscuous mode [ 1645.169757][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1645.224399][T10647] device bridge_slave_1 left promiscuous mode [ 1645.230592][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1645.273195][T10647] device bridge_slave_0 left promiscuous mode [ 1645.279348][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1645.334430][T10647] device bridge_slave_1 left promiscuous mode [ 1645.340644][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1645.403553][T10647] device bridge_slave_0 left promiscuous mode [ 1645.409902][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1651.013217][T10647] device hsr_slave_0 left promiscuous mode [ 1651.052765][T10647] device hsr_slave_1 left promiscuous mode [ 1651.100107][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1651.114593][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1651.125951][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1651.161176][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1651.249510][T10647] bond0 (unregistering): Released all slaves [ 1651.433011][T10647] device hsr_slave_0 left promiscuous mode [ 1651.472620][T10647] device hsr_slave_1 left promiscuous mode [ 1651.520043][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1651.533242][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1651.544599][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1651.586516][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1651.668667][T10647] bond0 (unregistering): Released all slaves [ 1651.793346][T10647] device hsr_slave_0 left promiscuous mode [ 1651.842592][T10647] device hsr_slave_1 left promiscuous mode [ 1651.890237][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1651.908364][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1651.920239][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1651.956653][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1652.050306][T10647] bond0 (unregistering): Released all slaves [ 1652.146674][T22211] team0: Port device team_slave_0 added [ 1652.158667][T22211] team0: Port device team_slave_1 added [ 1652.228731][T22211] device hsr_slave_0 entered promiscuous mode [ 1652.282893][T22211] device hsr_slave_1 entered promiscuous mode [ 1652.413795][T22178] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1652.431009][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1652.439237][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1652.449356][T22178] 8021q: adding VLAN 0 to HW filter on device team0 [ 1652.471778][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1652.482891][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1652.491233][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1652.498327][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1652.515907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1652.524531][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1652.533691][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1652.541992][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1652.549077][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1652.557239][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1652.565968][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1652.574434][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1652.583129][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1652.591858][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1652.602329][T22211] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1652.617657][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1652.626708][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1652.636743][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1652.645278][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1652.660514][T22211] 8021q: adding VLAN 0 to HW filter on device team0 [ 1652.670705][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1652.678544][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1652.686610][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1652.695401][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1652.763846][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1652.775969][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1652.784337][T22049] bridge0: port 1(bridge_slave_0) entered blocking state [ 1652.791355][T22049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1652.799535][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1652.808189][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1652.816560][T22049] bridge0: port 2(bridge_slave_1) entered blocking state [ 1652.823637][T22049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1652.831346][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1652.840470][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1652.849145][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1652.857667][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1652.866705][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1652.874822][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1652.945216][T22178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1653.021503][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1653.030791][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1653.039263][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1653.054316][T22211] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1653.066562][T22211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1653.077136][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1653.089262][T22178] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1653.122039][T22211] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1653.363311][T22227] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" [ 1653.412681][T22226] bridge0: port 2(bridge_slave_1) entered disabled state [ 1653.422183][T22226] bridge0: port 1(bridge_slave_0) entered disabled state [ 1653.517179][T22227] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "" 07:38:52 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000", 0x11, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:52 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:52 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:52 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xf, "6aa0d8a3430df333d742644b215767"}, &(0x7f0000000200)=0x17) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1654.274920][T22241] bridge0: port 2(bridge_slave_1) entered disabled state [ 1654.284137][T22241] bridge0: port 1(bridge_slave_0) entered disabled state 07:38:52 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:52 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:52 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:53 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000", 0x11, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:38:53 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:53 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:53 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:54 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:54 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:38:54 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500f0ff"], 0x48}}, 0x0) [ 1656.033925][T22267] IPVS: ftp: loaded support on port[0] = 21 [ 1656.257178][T22267] chnl_net:caif_netlink_parms(): no params data found [ 1656.314718][T22267] bridge0: port 1(bridge_slave_0) entered blocking state [ 1656.321857][T22267] bridge0: port 1(bridge_slave_0) entered disabled state [ 1656.330090][T22267] device bridge_slave_0 entered promiscuous mode [ 1656.338524][T22267] bridge0: port 2(bridge_slave_1) entered blocking state [ 1656.345969][T22267] bridge0: port 2(bridge_slave_1) entered disabled state [ 1656.354210][T22267] device bridge_slave_1 entered promiscuous mode [ 1656.376191][T22267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1656.388133][T22267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1656.418358][T22267] team0: Port device team_slave_0 added [ 1656.425702][T22267] team0: Port device team_slave_1 added [ 1656.526039][T22267] device hsr_slave_0 entered promiscuous mode [ 1656.592859][T22267] device hsr_slave_1 entered promiscuous mode [ 1656.632650][T22267] debugfs: Directory 'hsr0' with parent '/' already present! [ 1656.677855][T22267] bridge0: port 2(bridge_slave_1) entered blocking state [ 1656.684973][T22267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1656.692377][T22267] bridge0: port 1(bridge_slave_0) entered blocking state [ 1656.699436][T22267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1656.776769][T22267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1656.806596][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1656.817684][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 1656.825959][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 1656.840826][T22267] 8021q: adding VLAN 0 to HW filter on device team0 [ 1656.862538][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1656.864601][T22280] IPVS: ftp: loaded support on port[0] = 21 [ 1656.870896][T15184] bridge0: port 1(bridge_slave_0) entered blocking state [ 1656.883500][T15184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1656.892736][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1656.900993][T15184] bridge0: port 2(bridge_slave_1) entered blocking state [ 1656.908066][T15184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1656.935619][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1656.946100][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1656.963770][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1656.971468][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1656.987911][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1657.002183][T22267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1657.032119][T22267] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1657.138553][T22280] chnl_net:caif_netlink_parms(): no params data found [ 1657.182281][T22280] bridge0: port 1(bridge_slave_0) entered blocking state [ 1657.189617][T22280] bridge0: port 1(bridge_slave_0) entered disabled state [ 1657.197633][T22280] device bridge_slave_0 entered promiscuous mode [ 1657.205985][T22280] bridge0: port 2(bridge_slave_1) entered blocking state [ 1657.222276][T22280] bridge0: port 2(bridge_slave_1) entered disabled state [ 1657.231156][T22280] device bridge_slave_1 entered promiscuous mode [ 1657.279577][T22280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1657.294643][T22288] bridge0: port 2(bridge_slave_1) entered disabled state [ 1657.304313][T22288] bridge0: port 1(bridge_slave_0) entered disabled state [ 1657.874119][T22280] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:38:56 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000", 0x11, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1659.005267][T22280] team0: Port device team_slave_0 added [ 1659.318815][T22280] team0: Port device team_slave_1 added [ 1659.385333][T22280] device hsr_slave_0 entered promiscuous mode [ 1659.442815][T22280] device hsr_slave_1 entered promiscuous mode [ 1659.492555][T22280] debugfs: Directory 'hsr0' with parent '/' already present! [ 1659.833956][T22291] IPVS: ftp: loaded support on port[0] = 21 [ 1660.486485][T22280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1660.496316][T22291] chnl_net:caif_netlink_parms(): no params data found [ 1660.822098][T22291] bridge0: port 1(bridge_slave_0) entered blocking state [ 1660.830245][T22291] bridge0: port 1(bridge_slave_0) entered disabled state [ 1660.838822][T22291] device bridge_slave_0 entered promiscuous mode [ 1660.847558][T22291] bridge0: port 2(bridge_slave_1) entered blocking state [ 1660.855099][T22291] bridge0: port 2(bridge_slave_1) entered disabled state [ 1660.863081][T22291] device bridge_slave_1 entered promiscuous mode [ 1661.156912][T22280] 8021q: adding VLAN 0 to HW filter on device team0 [ 1661.176653][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1661.186600][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1661.206603][T22291] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1661.504983][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1661.514790][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1661.523636][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1661.530671][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1661.538900][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1661.547829][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1661.556259][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1661.563346][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1661.570965][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1661.580017][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1661.591971][T22291] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1661.601577][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1661.602104][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1661.619679][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1661.628935][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1661.650625][T22291] team0: Port device team_slave_0 added [ 1661.658367][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1661.667146][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1661.953121][T22291] team0: Port device team_slave_1 added [ 1661.976247][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1661.984802][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1661.993404][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1662.001571][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1662.011868][T10647] device bridge_slave_1 left promiscuous mode [ 1662.018385][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1662.073503][T10647] device bridge_slave_0 left promiscuous mode [ 1662.079688][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1662.144350][T10647] device bridge_slave_1 left promiscuous mode [ 1662.150520][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1662.183650][T10647] device bridge_slave_0 left promiscuous mode [ 1662.189860][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1662.245040][T10647] device bridge_slave_1 left promiscuous mode [ 1662.251199][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1662.293666][T10647] device bridge_slave_0 left promiscuous mode [ 1662.299873][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1662.354388][T10647] device bridge_slave_1 left promiscuous mode [ 1662.360608][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1662.403272][T10647] device bridge_slave_0 left promiscuous mode [ 1662.409410][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1669.862998][T10647] device hsr_slave_0 left promiscuous mode [ 1669.902613][T10647] device hsr_slave_1 left promiscuous mode [ 1669.963609][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1669.975680][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1669.986782][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1670.046169][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1670.129245][T10647] bond0 (unregistering): Released all slaves [ 1670.263837][T10647] device hsr_slave_0 left promiscuous mode [ 1670.312779][T10647] device hsr_slave_1 left promiscuous mode [ 1670.364373][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1670.377834][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1670.389806][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1670.456355][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1670.559196][T10647] bond0 (unregistering): Released all slaves [ 1670.703362][T10647] device hsr_slave_0 left promiscuous mode [ 1670.763523][T10647] device hsr_slave_1 left promiscuous mode [ 1670.816150][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1670.829308][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1670.840919][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1670.918458][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1670.989274][T10647] bond0 (unregistering): Released all slaves [ 1671.153573][T10647] device hsr_slave_0 left promiscuous mode [ 1671.192574][T10647] device hsr_slave_1 left promiscuous mode [ 1671.250465][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1671.263692][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1671.274898][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1671.326970][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1671.398933][T10647] bond0 (unregistering): Released all slaves [ 1671.504201][T22280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1671.584306][T22291] device hsr_slave_0 entered promiscuous mode [ 1671.632851][T22291] device hsr_slave_1 entered promiscuous mode [ 1671.693463][T22280] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1671.771539][T22291] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1671.783295][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1671.790959][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1671.820619][T22291] 8021q: adding VLAN 0 to HW filter on device team0 [ 1671.848806][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1671.861636][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1671.871787][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1671.878868][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1671.887675][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1671.927725][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1671.937099][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1671.945767][ T2998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1671.952860][ T2998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1671.967379][T22300] bridge0: port 2(bridge_slave_1) entered disabled state [ 1671.974778][T22300] bridge0: port 1(bridge_slave_0) entered disabled state 07:39:10 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) 07:39:10 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:10 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xf, "6aa0d8a3430df333d742644b215767"}, &(0x7f0000000200)=0x17) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:10 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000200"], 0x48}}, 0x0) 07:39:10 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1672.216441][T22291] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1672.240342][T22291] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 07:39:10 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000002"], 0x48}}, 0x0) 07:39:11 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000400"], 0x48}}, 0x0) [ 1672.863034][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1672.883316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:39:11 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000004"], 0x48}}, 0x0) [ 1672.912153][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1672.941560][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 07:39:11 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000a00"], 0x48}}, 0x0) [ 1672.979326][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1673.007151][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1673.074676][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1673.113107][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 07:39:11 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000a"], 0x48}}, 0x0) [ 1673.139491][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1673.178257][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 07:39:11 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xf, "6aa0d8a3430df333d742644b215767"}, &(0x7f0000000200)=0x17) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1673.257702][T22291] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1673.300827][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1673.316447][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1673.696583][T22336] bridge0: port 2(bridge_slave_1) entered disabled state [ 1673.705524][T22336] bridge0: port 1(bridge_slave_0) entered disabled state [ 1674.434444][T22339] IPVS: ftp: loaded support on port[0] = 21 07:39:13 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) timer_create(0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000300)) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 07:39:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000e00"], 0x48}}, 0x0) [ 1674.837799][T22339] chnl_net:caif_netlink_parms(): no params data found [ 1674.899626][T22339] bridge0: port 1(bridge_slave_0) entered blocking state [ 1674.922532][T22339] bridge0: port 1(bridge_slave_0) entered disabled state [ 1674.930487][T22339] device bridge_slave_0 entered promiscuous mode [ 1674.954303][T22339] bridge0: port 2(bridge_slave_1) entered blocking state [ 1674.961456][T22339] bridge0: port 2(bridge_slave_1) entered disabled state [ 1674.975345][T22339] device bridge_slave_1 entered promiscuous mode [ 1674.997119][T22339] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1675.008768][T22339] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1675.037817][T22339] team0: Port device team_slave_0 added [ 1675.066904][T22339] team0: Port device team_slave_1 added [ 1675.125240][T22339] device hsr_slave_0 entered promiscuous mode [ 1675.162760][T22339] device hsr_slave_1 entered promiscuous mode [ 1675.222464][T22339] debugfs: Directory 'hsr0' with parent '/' already present! [ 1675.236090][T22346] IPVS: ftp: loaded support on port[0] = 21 [ 1675.275506][T22339] bridge0: port 2(bridge_slave_1) entered blocking state [ 1675.282610][T22339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1675.289910][T22339] bridge0: port 1(bridge_slave_0) entered blocking state [ 1675.296977][T22339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1675.450446][T22339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1675.461918][T22346] chnl_net:caif_netlink_parms(): no params data found [ 1675.501409][T20262] bridge0: port 1(bridge_slave_0) entered disabled state [ 1675.509523][T20262] bridge0: port 2(bridge_slave_1) entered disabled state [ 1675.534618][T22339] 8021q: adding VLAN 0 to HW filter on device team0 [ 1675.543462][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1675.551246][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1675.559541][T22346] bridge0: port 1(bridge_slave_0) entered blocking state [ 1675.567113][T22346] bridge0: port 1(bridge_slave_0) entered disabled state [ 1675.580572][T22346] device bridge_slave_0 entered promiscuous mode [ 1675.590011][T22346] bridge0: port 2(bridge_slave_1) entered blocking state [ 1675.597517][T22346] bridge0: port 2(bridge_slave_1) entered disabled state [ 1675.605768][T22346] device bridge_slave_1 entered promiscuous mode [ 1675.630557][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1675.639454][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1675.658673][ T2998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1675.665805][ T2998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1675.701513][T22346] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1675.712514][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1675.721135][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1675.732207][T22049] bridge0: port 2(bridge_slave_1) entered blocking state [ 1675.739316][T22049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1675.748725][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1675.757255][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1675.766350][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1675.775526][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1675.784692][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1675.793798][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1675.802228][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1675.811512][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1675.821909][T22346] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1675.842035][T22339] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1675.854201][T22339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1675.862681][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1675.870555][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1675.880470][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1675.901490][T22346] team0: Port device team_slave_0 added [ 1675.919988][T22346] team0: Port device team_slave_1 added [ 1675.943168][T22339] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1676.005584][T22346] device hsr_slave_0 entered promiscuous mode [ 1676.044097][T22346] device hsr_slave_1 entered promiscuous mode [ 1676.092469][T22346] debugfs: Directory 'hsr0' with parent '/' already present! [ 1676.113525][T22346] bridge0: port 2(bridge_slave_1) entered blocking state [ 1676.120615][T22346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1676.162219][T22346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1676.175183][T20998] bridge0: port 2(bridge_slave_1) entered disabled state [ 1676.184113][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1676.214769][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1676.228902][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1676.247760][T22346] 8021q: adding VLAN 0 to HW filter on device team0 07:39:14 executing program 2: 07:39:14 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:14 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000f00"], 0x48}}, 0x0) [ 1676.260125][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1676.269276][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1676.287608][T22049] bridge0: port 1(bridge_slave_0) entered blocking state [ 1676.294732][T22049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1676.334507][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1676.355913][T20998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1676.363029][T20998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1676.383604][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1676.859261][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1676.868630][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1676.893550][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1676.901832][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1676.926673][T22346] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1676.982190][T22346] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1677.245437][T22365] bridge0: port 2(bridge_slave_1) entered disabled state [ 1677.254403][T22365] bridge0: port 1(bridge_slave_0) entered disabled state 07:39:16 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:16 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000e"], 0x48}}, 0x0) 07:39:16 executing program 4: 07:39:16 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5006000"], 0x48}}, 0x0) 07:39:16 executing program 2: 07:39:16 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5009e00"], 0x48}}, 0x0) 07:39:16 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000f"], 0x48}}, 0x0) 07:39:16 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500f000"], 0x48}}, 0x0) 07:39:16 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000060"], 0x48}}, 0x0) 07:39:17 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000a"], 0x48}}, 0x0) [ 1679.687149][T22387] IPVS: ftp: loaded support on port[0] = 21 [ 1680.330969][T22398] IPVS: ftp: loaded support on port[0] = 21 [ 1680.387269][T22387] chnl_net:caif_netlink_parms(): no params data found [ 1680.748370][T22401] IPVS: ftp: loaded support on port[0] = 21 [ 1681.093802][T22387] bridge0: port 1(bridge_slave_0) entered blocking state [ 1681.100897][T22387] bridge0: port 1(bridge_slave_0) entered disabled state [ 1681.109264][T22387] device bridge_slave_0 entered promiscuous mode [ 1681.119007][T22387] bridge0: port 2(bridge_slave_1) entered blocking state [ 1681.126158][T22387] bridge0: port 2(bridge_slave_1) entered disabled state [ 1681.133911][T22387] device bridge_slave_1 entered promiscuous mode [ 1681.143291][T22398] chnl_net:caif_netlink_parms(): no params data found [ 1681.456493][T22387] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1681.479714][T22387] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1681.811480][T22398] bridge0: port 1(bridge_slave_0) entered blocking state [ 1681.819836][T22398] bridge0: port 1(bridge_slave_0) entered disabled state [ 1681.827576][T22398] device bridge_slave_0 entered promiscuous mode [ 1681.836873][T22387] team0: Port device team_slave_0 added [ 1681.846430][T22387] team0: Port device team_slave_1 added [ 1681.852986][T22398] bridge0: port 2(bridge_slave_1) entered blocking state [ 1681.860032][T22398] bridge0: port 2(bridge_slave_1) entered disabled state [ 1681.868156][T22398] device bridge_slave_1 entered promiscuous mode [ 1682.179725][T22398] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1682.200952][T22398] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1682.265404][T22387] device hsr_slave_0 entered promiscuous mode [ 1682.332872][T22387] device hsr_slave_1 entered promiscuous mode [ 1682.382584][T22387] debugfs: Directory 'hsr0' with parent '/' already present! [ 1682.684647][T22398] team0: Port device team_slave_0 added [ 1682.691758][T22398] team0: Port device team_slave_1 added [ 1682.764502][T10647] device bridge_slave_1 left promiscuous mode [ 1682.770729][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1682.823841][T10647] device bridge_slave_0 left promiscuous mode [ 1682.830062][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1682.884485][T10647] device bridge_slave_1 left promiscuous mode [ 1682.890695][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1682.943531][T10647] device bridge_slave_0 left promiscuous mode [ 1682.949750][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1683.004494][T10647] device bridge_slave_1 left promiscuous mode [ 1683.010706][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1683.043722][T10647] device bridge_slave_0 left promiscuous mode [ 1683.049943][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1683.104437][T10647] device bridge_slave_1 left promiscuous mode [ 1683.110645][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1683.164494][T10647] device bridge_slave_0 left promiscuous mode [ 1683.170713][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1690.693116][T10647] device hsr_slave_0 left promiscuous mode [ 1690.732673][T10647] device hsr_slave_1 left promiscuous mode [ 1690.781845][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1690.795804][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1690.808602][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1690.848864][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1690.921315][T10647] bond0 (unregistering): Released all slaves [ 1691.083444][T10647] device hsr_slave_0 left promiscuous mode [ 1691.132574][T10647] device hsr_slave_1 left promiscuous mode [ 1691.194794][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1691.207780][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1691.218933][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1691.247403][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1691.348752][T10647] bond0 (unregistering): Released all slaves [ 1691.523430][T10647] device hsr_slave_0 left promiscuous mode [ 1691.562784][T10647] device hsr_slave_1 left promiscuous mode [ 1691.619884][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1691.635120][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1691.647767][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1691.689802][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1691.779531][T10647] bond0 (unregistering): Released all slaves [ 1691.893435][T10647] device hsr_slave_0 left promiscuous mode [ 1691.932556][T10647] device hsr_slave_1 left promiscuous mode [ 1691.990293][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1692.004915][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1692.015716][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1692.059272][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1692.154707][T10647] bond0 (unregistering): Released all slaves [ 1692.295448][T22398] device hsr_slave_0 entered promiscuous mode [ 1692.362708][T22398] device hsr_slave_1 entered promiscuous mode [ 1692.413730][T22401] chnl_net:caif_netlink_parms(): no params data found [ 1692.492307][T22401] bridge0: port 1(bridge_slave_0) entered blocking state [ 1692.500431][T22401] bridge0: port 1(bridge_slave_0) entered disabled state [ 1692.509196][T22401] device bridge_slave_0 entered promiscuous mode [ 1692.528457][T22387] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1692.539051][T22401] bridge0: port 2(bridge_slave_1) entered blocking state [ 1692.546265][T22401] bridge0: port 2(bridge_slave_1) entered disabled state [ 1692.554290][T22401] device bridge_slave_1 entered promiscuous mode [ 1692.582207][T22401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1692.593037][T22401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1692.623020][T22401] team0: Port device team_slave_0 added [ 1692.629810][T22401] team0: Port device team_slave_1 added [ 1692.638350][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1692.646189][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1692.660277][T22387] 8021q: adding VLAN 0 to HW filter on device team0 [ 1692.687911][T22398] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1692.715704][T22401] device hsr_slave_0 entered promiscuous mode [ 1692.762828][T22401] device hsr_slave_1 entered promiscuous mode [ 1692.802530][T22401] debugfs: Directory 'hsr0' with parent '/' already present! [ 1692.825122][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1692.833782][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1692.842054][ T8739] bridge0: port 1(bridge_slave_0) entered blocking state [ 1692.849139][ T8739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1692.864084][T22398] 8021q: adding VLAN 0 to HW filter on device team0 [ 1692.872292][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1692.880682][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1692.888566][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1692.897090][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1692.906077][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1692.914636][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1692.921669][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1692.952850][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1692.961344][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1692.970125][ T8739] bridge0: port 1(bridge_slave_0) entered blocking state [ 1692.977228][ T8739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1692.988279][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1692.997104][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1693.005784][ T8739] bridge0: port 2(bridge_slave_1) entered blocking state [ 1693.012894][ T8739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1693.020382][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1693.029340][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1693.037874][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1693.046461][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1693.054978][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1693.081702][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1693.089920][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1693.097670][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1693.154948][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1693.163832][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1693.172056][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1693.180469][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1693.188617][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1693.197571][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1693.206680][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1693.304589][T22401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1693.313049][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1693.320825][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1693.329274][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1693.337860][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1693.348106][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1693.356800][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1693.365187][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1693.373575][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1693.381733][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1693.430789][T22398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1693.451402][T22387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1693.459626][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1693.477252][T22401] 8021q: adding VLAN 0 to HW filter on device team0 [ 1693.509185][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1693.518063][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1693.533724][T15184] bridge0: port 1(bridge_slave_0) entered blocking state [ 1693.540777][T15184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1693.562644][T22398] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1693.584867][T22387] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1693.611762][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1693.620531][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1693.646309][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1693.671126][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1693.678257][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1693.693021][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1693.701721][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1693.717913][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1693.729085][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1693.741974][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1693.757167][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1693.767964][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1693.780558][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1693.796535][T22401] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1693.830127][T22401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1693.840363][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1693.855796][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1693.868688][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1693.902954][T22401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1694.114139][T22416] bridge0: port 2(bridge_slave_1) entered disabled state [ 1694.124825][T22416] bridge0: port 1(bridge_slave_0) entered disabled state 07:39:33 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:33 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000a5"], 0x48}}, 0x0) 07:39:33 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:33 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000e"], 0x48}}, 0x0) 07:39:33 executing program 4: 07:39:33 executing program 2: 07:39:33 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) 07:39:33 executing program 2: 07:39:33 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 07:39:33 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000f"], 0x48}}, 0x0) 07:39:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x20400) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) mq_getsetattr(r1, 0x0, 0x0) 07:39:34 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x10, 0x800000000080002, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa7}}], 0x80004ec, 0x0, 0x0) 07:39:34 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:34 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1695.815950][T22455] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1695.850115][T22459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1695.954095][T22455] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1695.995122][T22459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1697.280361][T22467] IPVS: ftp: loaded support on port[0] = 21 [ 1697.359451][T22467] chnl_net:caif_netlink_parms(): no params data found [ 1697.659197][T22467] bridge0: port 1(bridge_slave_0) entered blocking state [ 1697.666618][T22467] bridge0: port 1(bridge_slave_0) entered disabled state [ 1697.674496][T22467] device bridge_slave_0 entered promiscuous mode [ 1697.682864][T22467] bridge0: port 2(bridge_slave_1) entered blocking state [ 1697.689999][T22467] bridge0: port 2(bridge_slave_1) entered disabled state [ 1697.697771][T22467] device bridge_slave_1 entered promiscuous mode [ 1697.848813][T22467] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1697.860045][T22467] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1697.880260][T22467] team0: Port device team_slave_0 added [ 1697.889007][T22467] team0: Port device team_slave_1 added [ 1698.084288][T22467] device hsr_slave_0 entered promiscuous mode [ 1698.122718][T22467] device hsr_slave_1 entered promiscuous mode [ 1698.162607][T22467] debugfs: Directory 'hsr0' with parent '/' already present! [ 1698.338273][T22467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1698.351564][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1698.360501][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1698.371158][T22467] 8021q: adding VLAN 0 to HW filter on device team0 [ 1698.524210][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1698.533163][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1698.541644][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1698.548725][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1698.557643][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1698.567049][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1698.576507][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1698.583607][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1698.591066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1698.600057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1698.608653][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1698.617350][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1698.625867][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1698.634780][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1698.643746][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1698.651530][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1698.805675][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1698.813932][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1698.826045][T22467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1698.979058][T22467] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1699.359833][T22475] bridge0: port 2(bridge_slave_1) entered disabled state [ 1699.368371][T22475] bridge0: port 1(bridge_slave_0) entered disabled state [ 1699.924824][T10647] device bridge_slave_1 left promiscuous mode [ 1699.931054][T10647] bridge0: port 2(bridge_slave_1) entered disabled state 07:39:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,H^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 07:39:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500003f"], 0x48}}, 0x0) 07:39:38 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:38 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:38 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:39:38 executing program 4: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000040)=""/50, 0x32, 0x20000040, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 07:39:38 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:39:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000040"], 0x48}}, 0x0) 07:39:38 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xf, "6aa0d8a3430df333d742644b215767"}, &(0x7f0000000200)=0x17) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1700.235689][T10647] device bridge_slave_0 left promiscuous mode [ 1700.251722][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1700.307811][T10647] device bridge_slave_1 left promiscuous mode [ 1700.320941][T10647] bridge0: port 2(bridge_slave_1) entered disabled state 07:39:38 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1700.404905][T10647] device bridge_slave_0 left promiscuous mode [ 1700.419323][T10647] bridge0: port 1(bridge_slave_0) entered disabled state 07:39:39 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000060"], 0x48}}, 0x0) 07:39:39 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1704.572955][T10647] device hsr_slave_0 left promiscuous mode [ 1704.622508][T10647] device hsr_slave_1 left promiscuous mode [ 1704.685109][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1704.698364][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1704.709709][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1704.747215][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1704.840310][T10647] bond0 (unregistering): Released all slaves [ 1705.033557][T10647] device hsr_slave_0 left promiscuous mode [ 1705.072554][T10647] device hsr_slave_1 left promiscuous mode [ 1705.124601][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1705.137621][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1705.149582][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1705.199335][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1705.269828][T10647] bond0 (unregistering): Released all slaves [ 1705.538745][T22509] bridge0: port 2(bridge_slave_1) entered disabled state [ 1705.546215][T22509] bridge0: port 1(bridge_slave_0) entered disabled state [ 1705.809375][T22526] IPVS: ftp: loaded support on port[0] = 21 07:39:44 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r1 = socket$inet6(0xa, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:44 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500009e"], 0x48}}, 0x0) [ 1706.379088][T22526] chnl_net:caif_netlink_parms(): no params data found [ 1706.447796][T22526] bridge0: port 1(bridge_slave_0) entered blocking state [ 1706.455886][T22526] bridge0: port 1(bridge_slave_0) entered disabled state [ 1706.463914][T22526] device bridge_slave_0 entered promiscuous mode [ 1706.472207][T22526] bridge0: port 2(bridge_slave_1) entered blocking state [ 1706.480148][T22526] bridge0: port 2(bridge_slave_1) entered disabled state [ 1706.490761][T22526] device bridge_slave_1 entered promiscuous mode [ 1706.604144][T22526] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1706.615639][T22526] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1706.643696][T22526] team0: Port device team_slave_0 added [ 1706.650762][T22526] team0: Port device team_slave_1 added [ 1706.715289][T22526] device hsr_slave_0 entered promiscuous mode [ 1706.752786][T22526] device hsr_slave_1 entered promiscuous mode [ 1706.802599][T22526] debugfs: Directory 'hsr0' with parent '/' already present! [ 1706.885359][T22526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1706.907282][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1706.925062][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1706.939422][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1706.950042][T22526] 8021q: adding VLAN 0 to HW filter on device team0 [ 1706.969327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1706.985119][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1706.998812][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1707.005917][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1707.039439][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1707.048519][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1707.061965][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1707.078946][T21771] bridge0: port 2(bridge_slave_1) entered blocking state [ 1707.086085][T21771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1707.102034][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1707.121380][T22526] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1707.138918][T22526] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1707.160042][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1707.168705][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1707.186076][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1707.199274][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1707.223053][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1707.236234][T22526] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1707.438569][T22543] bridge0: port 2(bridge_slave_1) entered disabled state [ 1707.447866][T22543] bridge0: port 1(bridge_slave_0) entered disabled state 07:39:46 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xf, "6aa0d8a3430df333d742644b215767"}, &(0x7f0000000200)=0x17) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:46 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:46 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:46 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:39:46 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40), 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:39:46 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) 07:39:46 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:39:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000040"], 0x48}}, 0x0) 07:39:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:39:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000003"], 0x48}}, 0x0) 07:39:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:39:47 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1710.107253][T22574] IPVS: ftp: loaded support on port[0] = 21 [ 1710.171579][T22574] chnl_net:caif_netlink_parms(): no params data found [ 1710.832994][T22574] bridge0: port 1(bridge_slave_0) entered blocking state [ 1710.834253][T22578] IPVS: ftp: loaded support on port[0] = 21 [ 1710.840150][T22574] bridge0: port 1(bridge_slave_0) entered disabled state [ 1710.854189][T22579] IPVS: ftp: loaded support on port[0] = 21 [ 1710.860870][T22574] device bridge_slave_0 entered promiscuous mode [ 1710.874397][T22574] bridge0: port 2(bridge_slave_1) entered blocking state [ 1710.881507][T22574] bridge0: port 2(bridge_slave_1) entered disabled state [ 1710.889127][T22574] device bridge_slave_1 entered promiscuous mode [ 1711.185392][T22574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1711.198387][T22574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1711.784640][T22574] team0: Port device team_slave_0 added [ 1711.797662][T22574] team0: Port device team_slave_1 added [ 1711.844124][T22574] device hsr_slave_0 entered promiscuous mode [ 1711.892850][T22574] device hsr_slave_1 entered promiscuous mode [ 1711.952538][T22574] debugfs: Directory 'hsr0' with parent '/' already present! [ 1712.307075][T22579] chnl_net:caif_netlink_parms(): no params data found [ 1712.325267][T22578] chnl_net:caif_netlink_parms(): no params data found [ 1712.665612][T22578] bridge0: port 1(bridge_slave_0) entered blocking state [ 1712.673196][T22578] bridge0: port 1(bridge_slave_0) entered disabled state [ 1712.680900][T22578] device bridge_slave_0 entered promiscuous mode [ 1712.695322][T22579] bridge0: port 1(bridge_slave_0) entered blocking state [ 1712.702777][T22579] bridge0: port 1(bridge_slave_0) entered disabled state [ 1712.710331][T22579] device bridge_slave_0 entered promiscuous mode [ 1712.718020][T22578] bridge0: port 2(bridge_slave_1) entered blocking state [ 1712.725541][T22578] bridge0: port 2(bridge_slave_1) entered disabled state [ 1712.733809][T22578] device bridge_slave_1 entered promiscuous mode [ 1712.754339][T22579] bridge0: port 2(bridge_slave_1) entered blocking state [ 1712.761378][T22579] bridge0: port 2(bridge_slave_1) entered disabled state [ 1712.770090][T22579] device bridge_slave_1 entered promiscuous mode [ 1713.071944][T22578] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1713.086179][T22578] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1713.097501][T22579] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1713.109019][T22579] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1713.425986][T22578] team0: Port device team_slave_0 added [ 1713.435339][T22578] team0: Port device team_slave_1 added [ 1713.443265][T22579] team0: Port device team_slave_0 added [ 1713.455043][T22579] team0: Port device team_slave_1 added [ 1713.794963][T22578] device hsr_slave_0 entered promiscuous mode [ 1713.847561][T22578] device hsr_slave_1 entered promiscuous mode [ 1713.893469][T22578] debugfs: Directory 'hsr0' with parent '/' already present! [ 1713.920377][T22574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1713.930995][T10647] device bridge_slave_1 left promiscuous mode [ 1713.937767][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1713.993635][T10647] device bridge_slave_0 left promiscuous mode [ 1713.999850][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1714.034667][T10647] device bridge_slave_1 left promiscuous mode [ 1714.040860][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1714.073608][T10647] device bridge_slave_0 left promiscuous mode [ 1714.079820][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1714.134508][T10647] device bridge_slave_1 left promiscuous mode [ 1714.140727][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1714.193732][T10647] device bridge_slave_0 left promiscuous mode [ 1714.199938][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1714.254610][T10647] device bridge_slave_1 left promiscuous mode [ 1714.260771][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1714.323070][T10647] device bridge_slave_0 left promiscuous mode [ 1714.329216][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1721.822935][T10647] device hsr_slave_0 left promiscuous mode [ 1721.862672][T10647] device hsr_slave_1 left promiscuous mode [ 1721.909611][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1721.922435][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1721.934221][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1722.019690][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1722.118254][T10647] bond0 (unregistering): Released all slaves [ 1722.273219][T10647] device hsr_slave_0 left promiscuous mode [ 1722.322693][T10647] device hsr_slave_1 left promiscuous mode [ 1722.379359][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1722.395854][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1722.406743][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1722.456495][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1722.550038][T10647] bond0 (unregistering): Released all slaves [ 1722.713239][T10647] device hsr_slave_0 left promiscuous mode [ 1722.762573][T10647] device hsr_slave_1 left promiscuous mode [ 1722.813455][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1722.826436][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1722.837223][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1722.878223][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1722.947571][T10647] bond0 (unregistering): Released all slaves [ 1723.093357][T10647] device hsr_slave_0 left promiscuous mode [ 1723.132611][T10647] device hsr_slave_1 left promiscuous mode [ 1723.209691][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1723.222542][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1723.234894][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1723.268320][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1723.361135][T10647] bond0 (unregistering): Released all slaves [ 1723.485068][T22579] device hsr_slave_0 entered promiscuous mode [ 1723.512812][T22579] device hsr_slave_1 entered promiscuous mode [ 1723.582648][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1723.590273][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1723.601576][T22574] 8021q: adding VLAN 0 to HW filter on device team0 [ 1723.620855][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1723.629845][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1723.638470][T20262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1723.645563][T20262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1723.654638][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1723.678542][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1723.691724][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1723.700586][T22049] bridge0: port 2(bridge_slave_1) entered blocking state [ 1723.707965][T22049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1723.715835][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1723.748802][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1723.759286][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1723.768447][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1723.777970][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1723.786581][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1723.795338][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1723.811634][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1723.820210][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1723.846505][T22579] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1723.857048][T22574] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1723.869054][T22574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1723.881964][T22578] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1723.890341][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1723.898825][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1723.919747][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1723.927450][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1723.940815][T22578] 8021q: adding VLAN 0 to HW filter on device team0 [ 1723.951757][T22574] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1723.965715][T22579] 8021q: adding VLAN 0 to HW filter on device team0 [ 1723.982451][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1723.990118][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1724.000479][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1724.009654][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1724.018289][ T8762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1724.025423][ T8762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1724.033766][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1724.054751][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1724.070686][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1724.080283][T20998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1724.087372][T20998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1724.095835][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1724.104374][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1724.113095][T20998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1724.120126][T20998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1724.127835][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1724.137161][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1724.145832][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1724.283422][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1724.291955][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1724.300637][T15184] bridge0: port 2(bridge_slave_1) entered blocking state [ 1724.307721][T15184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1724.315443][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1724.339863][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1724.361315][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1724.380217][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1724.389265][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1724.397805][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1724.406562][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1724.415204][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1724.423807][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1724.432226][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1724.440790][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1724.449156][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1724.496979][T22579] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1724.514000][T22579] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1724.525611][T22589] bridge0: port 2(bridge_slave_1) entered disabled state [ 1724.533024][T22589] bridge0: port 1(bridge_slave_0) entered disabled state [ 1724.676098][T22578] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1724.705733][T22578] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1724.736306][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1724.744980][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1724.763778][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1724.777771][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 07:40:03 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xf, "6aa0d8a3430df333d742644b215767"}, &(0x7f0000000200)=0x17) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500ffff"], 0x48}}, 0x0) [ 1724.795298][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1724.822927][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1724.838226][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1724.873591][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1724.907332][T22578] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1724.919345][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1724.931663][T22579] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1725.571257][T22607] bridge0: port 2(bridge_slave_1) entered disabled state [ 1725.580136][T22607] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:04 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000ff"], 0x48}}, 0x0) 07:40:04 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1726.474238][T22610] bridge0: port 2(bridge_slave_1) entered disabled state [ 1726.481610][T22610] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x4, 0x1f, 0x3}, 0x3c) 07:40:05 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = getpid() r2 = getpgid(0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) kcmp(r1, r2, 0x0, r0, r3) 07:40:05 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:06 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:06 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:06 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:06 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x8, "6aa0d8a3430df333"}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1728.101263][T22646] IPVS: ftp: loaded support on port[0] = 21 [ 1728.238731][T22646] chnl_net:caif_netlink_parms(): no params data found [ 1728.296900][T22646] bridge0: port 1(bridge_slave_0) entered blocking state [ 1728.310696][T22646] bridge0: port 1(bridge_slave_0) entered disabled state [ 1728.320745][T22646] device bridge_slave_0 entered promiscuous mode [ 1728.335933][T22646] bridge0: port 2(bridge_slave_1) entered blocking state [ 1728.343540][T22646] bridge0: port 2(bridge_slave_1) entered disabled state [ 1728.351071][T22646] device bridge_slave_1 entered promiscuous mode [ 1728.370079][T22646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1728.386373][T22646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1728.421241][T22646] team0: Port device team_slave_0 added [ 1728.431239][T22646] team0: Port device team_slave_1 added [ 1728.545291][T22646] device hsr_slave_0 entered promiscuous mode [ 1728.582799][T22646] device hsr_slave_1 entered promiscuous mode [ 1728.642468][T22646] debugfs: Directory 'hsr0' with parent '/' already present! [ 1728.659982][T22646] bridge0: port 2(bridge_slave_1) entered blocking state [ 1728.667104][T22646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1728.674490][T22646] bridge0: port 1(bridge_slave_0) entered blocking state [ 1728.681532][T22646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1728.750182][T22646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1728.771227][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1728.781899][ T8743] bridge0: port 1(bridge_slave_0) entered disabled state [ 1728.790064][ T8743] bridge0: port 2(bridge_slave_1) entered disabled state [ 1728.803214][T22646] 8021q: adding VLAN 0 to HW filter on device team0 [ 1728.812480][T22649] IPVS: ftp: loaded support on port[0] = 21 [ 1728.820886][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1728.829688][T22049] bridge0: port 1(bridge_slave_0) entered blocking state [ 1728.836761][T22049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1728.861928][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1728.870641][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1728.879075][T20262] bridge0: port 2(bridge_slave_1) entered blocking state [ 1728.879110][T20262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1728.894602][T22646] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1728.905040][T22646] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1728.932879][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1728.941424][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1728.955934][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1728.964771][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1728.973672][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1728.982059][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1728.990615][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1728.998903][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1729.007598][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1729.015906][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1729.041108][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1729.049219][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1729.059454][T22646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1729.165763][T22649] chnl_net:caif_netlink_parms(): no params data found [ 1729.197783][T22649] bridge0: port 1(bridge_slave_0) entered blocking state [ 1729.205139][T22649] bridge0: port 1(bridge_slave_0) entered disabled state [ 1729.222313][T22649] device bridge_slave_0 entered promiscuous mode [ 1729.231429][T22649] bridge0: port 2(bridge_slave_1) entered blocking state [ 1729.262184][T22649] bridge0: port 2(bridge_slave_1) entered disabled state [ 1729.277144][T22649] device bridge_slave_1 entered promiscuous mode [ 1729.303480][T22649] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1729.321184][T22649] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1729.347101][T22649] team0: Port device team_slave_0 added [ 1729.356171][T22649] team0: Port device team_slave_1 added [ 1729.363372][T22657] bridge0: port 2(bridge_slave_1) entered disabled state [ 1729.372414][T22657] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:08 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 07:40:08 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x8, "6aa0d8a3430df333"}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:08 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1731.325190][T22649] device hsr_slave_0 entered promiscuous mode [ 1731.362927][T22649] device hsr_slave_1 entered promiscuous mode [ 1731.422560][T22649] debugfs: Directory 'hsr0' with parent '/' already present! [ 1731.939069][T22668] IPVS: ftp: loaded support on port[0] = 21 [ 1731.947489][T22649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1731.968686][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1731.977478][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1732.210888][T22649] 8021q: adding VLAN 0 to HW filter on device team0 [ 1732.251521][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1732.260916][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1732.276320][T16975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1732.283453][T16975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1732.295514][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1732.304281][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1732.312698][T16975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1732.319727][T16975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1732.327334][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1732.335909][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1732.364263][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1732.373611][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1732.382221][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1732.383772][T22670] IPVS: ftp: loaded support on port[0] = 21 [ 1732.397244][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1732.436858][T22668] chnl_net:caif_netlink_parms(): no params data found [ 1732.664100][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1732.675311][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1732.911504][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1732.922829][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1733.171777][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1733.180899][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1733.189680][T22668] bridge0: port 1(bridge_slave_0) entered blocking state [ 1733.197395][T22668] bridge0: port 1(bridge_slave_0) entered disabled state [ 1733.205904][T22668] device bridge_slave_0 entered promiscuous mode [ 1733.214679][T22668] bridge0: port 2(bridge_slave_1) entered blocking state [ 1733.221718][T22668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1733.229649][T22668] device bridge_slave_1 entered promiscuous mode [ 1733.239885][T22649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1733.480177][T22668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1733.492803][T22668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1733.516630][T22668] team0: Port device team_slave_0 added [ 1733.529965][T22668] team0: Port device team_slave_1 added [ 1733.544590][T22649] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1733.595633][T22668] device hsr_slave_0 entered promiscuous mode [ 1733.633864][T22668] device hsr_slave_1 entered promiscuous mode [ 1733.672646][T22668] debugfs: Directory 'hsr0' with parent '/' already present! [ 1733.946538][T10647] device bridge_slave_1 left promiscuous mode [ 1733.953291][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1733.993479][T10647] device bridge_slave_0 left promiscuous mode [ 1733.999779][T10647] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400070500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000800706965000c0002000800010000d6452f795dc5faa965306f1cad704b5b94633e98d6916f5da9f399cc894ce3f78efaebc49f883dd3b9e5e54f66fe9dc22ac5e4"], 0x38}}, 0x0) 07:40:12 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:12 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:12 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1734.065204][T10647] device bridge_slave_1 left promiscuous mode [ 1734.071385][T10647] bridge0: port 2(bridge_slave_1) entered disabled state 07:40:12 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1734.165226][T10647] device bridge_slave_0 left promiscuous mode [ 1734.171480][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1734.234512][T10647] device bridge_slave_1 left promiscuous mode [ 1734.245666][T10647] bridge0: port 2(bridge_slave_1) entered disabled state 07:40:12 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1734.319163][T10647] device bridge_slave_0 left promiscuous mode [ 1734.346940][T10647] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:13 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:13 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1740.443083][T10647] device hsr_slave_0 left promiscuous mode [ 1740.482629][T10647] device hsr_slave_1 left promiscuous mode [ 1740.534194][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1740.548328][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1740.560093][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1740.599717][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1740.690941][T10647] bond0 (unregistering): Released all slaves [ 1740.893553][T10647] device hsr_slave_0 left promiscuous mode [ 1740.932507][T10647] device hsr_slave_1 left promiscuous mode [ 1740.980511][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1740.993786][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1741.005498][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1741.068853][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1741.159330][T10647] bond0 (unregistering): Released all slaves [ 1741.293343][T10647] device hsr_slave_0 left promiscuous mode [ 1741.336975][T10647] device hsr_slave_1 left promiscuous mode [ 1741.403790][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1741.415957][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1741.427541][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1741.489077][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1741.580324][T10647] bond0 (unregistering): Released all slaves [ 1741.688353][T22716] IPVS: ftp: loaded support on port[0] = 21 [ 1741.693518][T22670] chnl_net:caif_netlink_parms(): no params data found [ 1741.780953][T22668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1741.794825][T22670] bridge0: port 1(bridge_slave_0) entered blocking state [ 1741.801942][T22670] bridge0: port 1(bridge_slave_0) entered disabled state [ 1741.809872][T22670] device bridge_slave_0 entered promiscuous mode [ 1741.819093][T22670] bridge0: port 2(bridge_slave_1) entered blocking state [ 1741.826369][T22670] bridge0: port 2(bridge_slave_1) entered disabled state [ 1741.835536][T22670] device bridge_slave_1 entered promiscuous mode [ 1741.855967][T22670] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1741.868612][T22670] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1741.895321][T22668] 8021q: adding VLAN 0 to HW filter on device team0 [ 1741.904743][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1741.912592][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1741.927776][T22670] team0: Port device team_slave_0 added [ 1741.941947][T22670] team0: Port device team_slave_1 added [ 1741.949992][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1741.958939][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1741.967608][ T8762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1741.974703][ T8762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1741.994619][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1742.008956][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1742.017436][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1742.026397][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1742.033571][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1742.041027][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1742.049926][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1742.058581][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1742.067698][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1742.093617][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1742.101242][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1742.110435][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1742.165860][T22670] device hsr_slave_0 entered promiscuous mode [ 1742.222831][T22670] device hsr_slave_1 entered promiscuous mode [ 1742.279282][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1742.287796][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1742.299534][T22668] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1742.311345][T22668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1742.354769][T22716] chnl_net:caif_netlink_parms(): no params data found [ 1742.367217][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1742.375449][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1742.570591][T22716] bridge0: port 1(bridge_slave_0) entered blocking state [ 1742.585345][T22716] bridge0: port 1(bridge_slave_0) entered disabled state [ 1742.598148][T22716] device bridge_slave_0 entered promiscuous mode [ 1742.621120][T22668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1742.643242][T22716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1742.650631][T22716] bridge0: port 2(bridge_slave_1) entered disabled state [ 1742.670142][T22716] device bridge_slave_1 entered promiscuous mode [ 1742.731562][T22716] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1742.755305][T22670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1742.764805][T22716] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1742.789101][T22670] 8021q: adding VLAN 0 to HW filter on device team0 [ 1742.798760][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1742.806933][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1742.854600][T22716] team0: Port device team_slave_0 added [ 1742.862011][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1742.871827][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1742.901004][T21771] bridge0: port 1(bridge_slave_0) entered blocking state [ 1742.908122][T21771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1742.924817][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1742.941052][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1742.958291][T21771] bridge0: port 2(bridge_slave_1) entered blocking state [ 1742.965390][T21771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1742.981523][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1742.990378][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1743.007055][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1743.020591][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1743.043704][T22716] team0: Port device team_slave_1 added [ 1743.051518][T22725] bridge0: port 2(bridge_slave_1) entered disabled state [ 1743.063407][T22725] bridge0: port 1(bridge_slave_0) entered disabled state [ 1743.765801][T22716] device hsr_slave_0 entered promiscuous mode [ 1743.821535][T22716] device hsr_slave_1 entered promiscuous mode [ 1743.902454][T22716] debugfs: Directory 'hsr0' with parent '/' already present! [ 1743.922649][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1743.930489][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1743.938484][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1743.948261][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1743.957504][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1743.966619][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1743.976804][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1743.985349][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1744.006353][T22670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1744.244751][T22670] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1744.300425][T22716] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1744.324311][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1744.340170][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1744.350988][T22716] 8021q: adding VLAN 0 to HW filter on device team0 [ 1744.364134][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1744.383477][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1744.391889][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1744.398985][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1744.425647][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1744.434748][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1744.451850][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1744.461429][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1744.468577][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1744.477820][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1744.486743][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1744.508323][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1744.517142][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1744.525728][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1744.555806][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1744.579024][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1744.599491][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1744.625587][T22716] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1744.659145][T22716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:40:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='net/dev\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a8, 0x800408) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40046602, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:40:23 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:23 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000ff"], 0x48}}, 0x0) 07:40:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x20400) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) fcntl$getflags(r1, 0x2) [ 1744.687075][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1744.700983][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1744.721353][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1744.791190][T22716] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1745.200061][T22757] bridge0: port 2(bridge_slave_1) entered disabled state [ 1745.210048][T22757] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:24 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:24 executing program 2: 07:40:24 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x8, "6aa0d8a3430df333"}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:24 executing program 4: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000240)='./file1\x00', 0x0) mkdirat(r0, &(0x7f0000000440)='./file1/file0\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file1/file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000140)='./bus\x00', r1, &(0x7f0000000240)='./bus\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x1) 07:40:24 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:24 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:24 executing program 2: 07:40:24 executing program 4: 07:40:24 executing program 2: 07:40:24 executing program 2: 07:40:25 executing program 4: 07:40:25 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500ffff"], 0x48}}, 0x0) 07:40:25 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:25 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000ff"], 0x48}}, 0x0) [ 1748.108247][T22796] IPVS: ftp: loaded support on port[0] = 21 [ 1748.311347][T22796] chnl_net:caif_netlink_parms(): no params data found [ 1748.481139][T22796] bridge0: port 1(bridge_slave_0) entered blocking state [ 1748.488679][T22796] bridge0: port 1(bridge_slave_0) entered disabled state [ 1748.496861][T22796] device bridge_slave_0 entered promiscuous mode [ 1748.644085][T22796] bridge0: port 2(bridge_slave_1) entered blocking state [ 1748.651166][T22796] bridge0: port 2(bridge_slave_1) entered disabled state [ 1748.659490][T22796] device bridge_slave_1 entered promiscuous mode [ 1748.677064][T22796] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1748.687738][T22796] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1748.847374][T22796] team0: Port device team_slave_0 added [ 1748.854839][T22796] team0: Port device team_slave_1 added [ 1748.895175][T22796] device hsr_slave_0 entered promiscuous mode [ 1748.932846][T22796] device hsr_slave_1 entered promiscuous mode [ 1749.002554][T22796] debugfs: Directory 'hsr0' with parent '/' already present! [ 1749.012188][T10647] device bridge_slave_1 left promiscuous mode [ 1749.018594][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1749.043404][T10647] device bridge_slave_0 left promiscuous mode [ 1749.049584][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1749.114512][T10647] device bridge_slave_1 left promiscuous mode [ 1749.120921][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1749.183213][T10647] device bridge_slave_0 left promiscuous mode [ 1749.189505][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1752.862904][T10647] device hsr_slave_0 left promiscuous mode [ 1752.912766][T10647] device hsr_slave_1 left promiscuous mode [ 1752.960674][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1752.976345][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1752.988495][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1753.027828][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1753.130160][T10647] bond0 (unregistering): Released all slaves [ 1753.273015][T10647] device hsr_slave_0 left promiscuous mode [ 1753.322738][T10647] device hsr_slave_1 left promiscuous mode [ 1753.373990][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1753.387019][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1753.399603][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1753.436905][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1753.537573][T10647] bond0 (unregistering): Released all slaves [ 1753.670922][T22796] bridge0: port 2(bridge_slave_1) entered blocking state [ 1753.678263][T22796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1753.685812][T22796] bridge0: port 1(bridge_slave_0) entered blocking state [ 1753.692901][T22796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1753.702374][ T8762] bridge0: port 1(bridge_slave_0) entered disabled state [ 1753.710576][ T8762] bridge0: port 2(bridge_slave_1) entered disabled state [ 1753.750745][T22796] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1753.764070][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1753.771802][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1753.785155][T22796] 8021q: adding VLAN 0 to HW filter on device team0 [ 1753.795774][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1753.805313][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1753.813953][ T2998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1753.820993][ T2998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1753.843694][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1753.852251][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1753.860696][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1753.867849][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1753.876331][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1753.885108][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1753.893907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1753.902891][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1753.911198][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1753.919922][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1753.928834][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1753.942240][T22796] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1753.954078][T22796] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1753.967704][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1753.976751][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1753.985394][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1753.994220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1754.002534][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1754.025639][T22796] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1754.270514][T22804] bridge0: port 2(bridge_slave_1) entered disabled state [ 1754.280184][T22804] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:33 executing program 4: 07:40:33 executing program 2: 07:40:33 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500ffff"], 0x48}}, 0x0) 07:40:33 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:33 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xc, "6aa0d8a3430df333d742644b"}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:33 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:33 executing program 2: 07:40:33 executing program 4: 07:40:33 executing program 4: 07:40:33 executing program 2: 07:40:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@migrate={0x54, 0x21, 0x21, 0x0, 0x0, {{@in=@local}}, [@migrate={0x4}]}, 0x54}}, 0x0) 07:40:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 07:40:34 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) 07:40:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x713e000000000000, 0x43400) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) 07:40:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 1757.327654][T22850] IPVS: ftp: loaded support on port[0] = 21 [ 1757.391181][T22850] chnl_net:caif_netlink_parms(): no params data found [ 1757.421385][T22850] bridge0: port 1(bridge_slave_0) entered blocking state [ 1757.428807][T22850] bridge0: port 1(bridge_slave_0) entered disabled state [ 1757.436796][T22850] device bridge_slave_0 entered promiscuous mode [ 1757.444625][T22850] bridge0: port 2(bridge_slave_1) entered blocking state [ 1757.451704][T22850] bridge0: port 2(bridge_slave_1) entered disabled state [ 1757.459527][T22850] device bridge_slave_1 entered promiscuous mode [ 1757.746581][T22850] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1757.757445][T22850] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1757.775175][T22850] team0: Port device team_slave_0 added [ 1757.781736][T22850] team0: Port device team_slave_1 added [ 1757.815496][T22850] device hsr_slave_0 entered promiscuous mode [ 1757.862652][T22850] device hsr_slave_1 entered promiscuous mode [ 1757.902462][T22850] debugfs: Directory 'hsr0' with parent '/' already present! [ 1758.049945][T22850] bridge0: port 2(bridge_slave_1) entered blocking state [ 1758.057061][T22850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1758.064435][T22850] bridge0: port 1(bridge_slave_0) entered blocking state [ 1758.071476][T22850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1758.107178][T22850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1758.257719][T22850] 8021q: adding VLAN 0 to HW filter on device team0 [ 1758.266118][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1758.274103][T21134] bridge0: port 1(bridge_slave_0) entered disabled state [ 1758.281608][T21134] bridge0: port 2(bridge_slave_1) entered disabled state [ 1758.290604][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1758.304754][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1758.313268][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1758.320296][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1758.474993][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1758.483824][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1758.492093][T16975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1758.499173][T16975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1758.507293][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1758.516542][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1758.525445][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1758.533999][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1758.543635][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1758.692265][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1758.702181][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1758.713533][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1758.721794][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1758.736137][T22850] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1758.747202][T22850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1758.755113][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1758.764025][T22049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1758.917399][T22850] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1759.313793][T22859] bridge0: port 2(bridge_slave_1) entered disabled state [ 1759.321195][T22859] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:38 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5007fff"], 0x48}}, 0x0) 07:40:38 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500007f"], 0x48}}, 0x0) 07:40:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 07:40:38 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xc, "6aa0d8a3430df333d742644b"}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x101000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x9fc, 0x0) fcntl$setsig(r2, 0xa, 0x25) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) write$P9_RREAD(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="5b000000750200cfce92417b08f77640915fdd868ed6fe5000000054f752231f564a557bdcdf831f950a49f516845d6f239b1afead1e75dca286a0b5b1db5f1042a05408c7b0ed1364788935383bf0eee16c93df0b643ec6315cd51355823badea123533f35c41ec4d9cf1"], 0x5b) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/fuse\x00', 0x2, 0x0) unshare(0x40000000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x6, 0x9}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r4, 0x2}, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000001c0)={0x2, 'veth0_to_hsr\x00'}, 0x18) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x2, 'lo\x00'}, 0x18) 07:40:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5009eff"], 0x48}}, 0x0) [ 1759.639976][T22871] IPVS: ftp: loaded support on port[0] = 21 07:40:38 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500009e"], 0x48}}, 0x0) 07:40:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500f0ff"], 0x48}}, 0x0) 07:40:38 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) 07:40:38 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:38 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1760.227239][T22892] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 [ 1760.408253][T22894] IPVS: stopping backup sync thread 22892 ... [ 1760.460972][T22868] IPVS: ftp: loaded support on port[0] = 21 07:40:39 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 07:40:39 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500ffff"], 0x48}}, 0x0) 07:40:39 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000ff"], 0x48}}, 0x0) [ 1760.852756][T10647] device bridge_slave_1 left promiscuous mode [ 1760.859025][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1760.940401][T10647] device bridge_slave_0 left promiscuous mode [ 1760.957384][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1761.025278][T10647] device bridge_slave_1 left promiscuous mode [ 1761.031468][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1761.088450][T10647] device bridge_slave_0 left promiscuous mode [ 1761.095296][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1765.703076][T10647] device hsr_slave_0 left promiscuous mode [ 1765.742532][T10647] device hsr_slave_1 left promiscuous mode [ 1765.820243][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1765.834885][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1765.848225][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1765.896995][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1765.968685][T10647] bond0 (unregistering): Released all slaves [ 1766.133469][T10647] device hsr_slave_0 left promiscuous mode [ 1766.192476][T10647] device hsr_slave_1 left promiscuous mode [ 1766.261011][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1766.274517][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1766.285344][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1766.338972][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1766.477589][T10647] bond0 (unregistering): Released all slaves [ 1766.590727][T22915] IPVS: ftp: loaded support on port[0] = 21 [ 1766.761898][T22915] chnl_net:caif_netlink_parms(): no params data found [ 1766.903464][T22915] bridge0: port 1(bridge_slave_0) entered blocking state [ 1766.910550][T22915] bridge0: port 1(bridge_slave_0) entered disabled state [ 1766.933379][T22915] device bridge_slave_0 entered promiscuous mode [ 1766.942970][T22915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1766.950084][T22915] bridge0: port 2(bridge_slave_1) entered disabled state [ 1766.958334][T22915] device bridge_slave_1 entered promiscuous mode [ 1766.987234][T22915] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1767.007366][T22915] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1767.058855][T22915] team0: Port device team_slave_0 added [ 1767.074171][T22915] team0: Port device team_slave_1 added [ 1767.175265][T22915] device hsr_slave_0 entered promiscuous mode [ 1767.219141][T22915] device hsr_slave_1 entered promiscuous mode [ 1767.262440][T22915] debugfs: Directory 'hsr0' with parent '/' already present! [ 1767.310215][T22915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1767.317349][T22915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1767.324741][T22915] bridge0: port 1(bridge_slave_0) entered blocking state [ 1767.331797][T22915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1767.445573][T22915] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1767.469105][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1767.487515][T16975] bridge0: port 1(bridge_slave_0) entered disabled state [ 1767.496216][T16975] bridge0: port 2(bridge_slave_1) entered disabled state [ 1767.523404][T22915] 8021q: adding VLAN 0 to HW filter on device team0 [ 1767.570720][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1767.585269][T16975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1767.592383][T16975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1767.628699][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1767.637241][T21134] bridge0: port 2(bridge_slave_1) entered blocking state [ 1767.644364][T21134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1767.670736][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1767.680207][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1767.696500][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1767.709181][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1767.721336][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1767.737564][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1767.747287][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1767.764843][T22915] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1767.777471][T22915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1767.787352][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1767.796431][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1767.805170][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1767.830101][T22915] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1767.990487][T22925] bridge0: port 2(bridge_slave_1) entered disabled state [ 1767.999678][T22925] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:47 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xc, "6aa0d8a3430df333d742644b"}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:47 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) 07:40:47 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x8, "6aa0d8a3430df333"}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1768.889842][T22932] bridge0: port 2(bridge_slave_1) entered disabled state [ 1768.898921][T22932] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:47 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:48 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1770.107088][T22952] bridge0: port 2(bridge_slave_1) entered disabled state [ 1770.114517][T22952] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:49 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xe, "6aa0d8a3430df333d742644b2157"}, &(0x7f0000000200)=0x16) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:49 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1770.984546][T22970] IPVS: ftp: loaded support on port[0] = 21 [ 1771.059266][T22970] chnl_net:caif_netlink_parms(): no params data found [ 1771.480721][T22970] bridge0: port 1(bridge_slave_0) entered blocking state [ 1771.489294][T22970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1771.497252][T22970] device bridge_slave_0 entered promiscuous mode [ 1771.507562][T22970] bridge0: port 2(bridge_slave_1) entered blocking state [ 1771.516011][T22970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1771.523926][T22970] device bridge_slave_1 entered promiscuous mode [ 1771.747012][T22970] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1771.757430][T22970] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1771.775935][T22970] team0: Port device team_slave_0 added [ 1771.783813][T22970] team0: Port device team_slave_1 added [ 1772.054942][T22970] device hsr_slave_0 entered promiscuous mode [ 1772.082783][T22970] device hsr_slave_1 entered promiscuous mode [ 1772.123329][T22970] debugfs: Directory 'hsr0' with parent '/' already present! [ 1772.363111][T22970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1772.378220][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1772.387808][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1772.594819][T22970] 8021q: adding VLAN 0 to HW filter on device team0 [ 1772.606057][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1772.614627][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1772.623605][T16975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1772.630701][T16975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1772.638924][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1772.866118][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1772.875356][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1772.883882][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1772.890907][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1772.898590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1773.118733][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1773.130543][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1773.139251][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1773.148760][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1773.157661][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1773.166313][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1773.378980][T22970] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1773.389680][T22970] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1773.401048][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1773.411164][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1773.420189][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1773.428436][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1773.640688][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1773.657552][T22970] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1773.665962][T10647] device bridge_slave_1 left promiscuous mode [ 1773.672145][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1773.714006][T10647] device bridge_slave_0 left promiscuous mode [ 1773.720184][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1773.774565][T10647] device bridge_slave_1 left promiscuous mode [ 1773.780744][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1773.843223][T10647] device bridge_slave_0 left promiscuous mode [ 1773.849380][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1773.894644][T10647] device bridge_slave_1 left promiscuous mode [ 1773.900818][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1773.933558][T10647] device bridge_slave_0 left promiscuous mode [ 1773.939728][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1779.183113][T10647] device hsr_slave_0 left promiscuous mode [ 1779.222657][T10647] device hsr_slave_1 left promiscuous mode [ 1779.274361][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1779.286806][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1779.297671][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1779.336022][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1779.439788][T10647] bond0 (unregistering): Released all slaves [ 1779.623078][T10647] device hsr_slave_0 left promiscuous mode [ 1779.672606][T10647] device hsr_slave_1 left promiscuous mode [ 1779.739776][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1779.753857][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1779.764782][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1779.849186][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1779.968533][T10647] bond0 (unregistering): Released all slaves [ 1780.113619][T10647] device hsr_slave_0 left promiscuous mode [ 1780.152672][T10647] device hsr_slave_1 left promiscuous mode [ 1780.203830][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1780.216070][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1780.226988][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1780.266075][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1780.367364][T10647] bond0 (unregistering): Released all slaves [ 1780.598791][T22978] bridge0: port 2(bridge_slave_1) entered disabled state [ 1780.608144][T22978] bridge0: port 1(bridge_slave_0) entered disabled state 07:40:59 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:59 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:59 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:59 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:59 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xe, "6aa0d8a3430df333d742644b2157"}, &(0x7f0000000200)=0x16) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:40:59 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:40:59 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:00 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:00 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:00 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:00 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:00 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1783.200202][T23005] IPVS: ftp: loaded support on port[0] = 21 [ 1783.336130][T23005] chnl_net:caif_netlink_parms(): no params data found [ 1783.391655][T23005] bridge0: port 1(bridge_slave_0) entered blocking state [ 1783.399501][T23005] bridge0: port 1(bridge_slave_0) entered disabled state [ 1783.413176][T23005] device bridge_slave_0 entered promiscuous mode [ 1783.421324][T23005] bridge0: port 2(bridge_slave_1) entered blocking state [ 1783.434050][T23005] bridge0: port 2(bridge_slave_1) entered disabled state [ 1783.441996][T23005] device bridge_slave_1 entered promiscuous mode [ 1783.474715][T23005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1783.486503][T23005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1783.510561][T23005] team0: Port device team_slave_0 added [ 1783.519007][T23005] team0: Port device team_slave_1 added [ 1783.585133][T23005] device hsr_slave_0 entered promiscuous mode [ 1783.627796][T23005] device hsr_slave_1 entered promiscuous mode [ 1783.723877][T23005] bridge0: port 2(bridge_slave_1) entered blocking state [ 1783.730984][T23005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1783.738369][T23005] bridge0: port 1(bridge_slave_0) entered blocking state [ 1783.745462][T23005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1783.801702][T23009] IPVS: ftp: loaded support on port[0] = 21 [ 1783.832428][T23005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1783.881127][T23010] IPVS: ftp: loaded support on port[0] = 21 [ 1783.908184][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1783.916505][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 1783.924669][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 1783.933801][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1783.948111][T23005] 8021q: adding VLAN 0 to HW filter on device team0 [ 1783.978835][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1783.988012][ T8739] bridge0: port 1(bridge_slave_0) entered blocking state [ 1783.995108][ T8739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1784.044673][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1784.053225][ T8739] bridge0: port 2(bridge_slave_1) entered blocking state [ 1784.060277][ T8739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1784.092695][T23009] chnl_net:caif_netlink_parms(): no params data found [ 1784.112464][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1784.120839][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1784.129289][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1784.170711][T23005] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1784.181772][T23005] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1784.197855][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1784.206476][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1784.548747][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1784.569928][T23014] IPVS: ftp: loaded support on port[0] = 21 [ 1784.574947][T23005] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1784.596953][T23010] chnl_net:caif_netlink_parms(): no params data found [ 1784.747808][T23009] bridge0: port 1(bridge_slave_0) entered blocking state [ 1784.755701][T23009] bridge0: port 1(bridge_slave_0) entered disabled state [ 1784.764369][T23009] device bridge_slave_0 entered promiscuous mode [ 1784.773954][T23009] bridge0: port 2(bridge_slave_1) entered blocking state [ 1784.780991][T23009] bridge0: port 2(bridge_slave_1) entered disabled state [ 1784.789875][T23009] device bridge_slave_1 entered promiscuous mode [ 1784.970366][T23009] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1784.981483][T23009] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1785.221809][T23009] team0: Port device team_slave_0 added [ 1785.230399][T23021] bridge0: port 2(bridge_slave_1) entered disabled state [ 1785.239555][T23021] bridge0: port 1(bridge_slave_0) entered disabled state [ 1785.805948][T23010] bridge0: port 1(bridge_slave_0) entered blocking state [ 1785.822678][T23010] bridge0: port 1(bridge_slave_0) entered disabled state [ 1785.830600][T23010] device bridge_slave_0 entered promiscuous mode [ 1785.849277][T23009] team0: Port device team_slave_1 added [ 1786.081606][T23010] bridge0: port 2(bridge_slave_1) entered blocking state [ 1786.088978][T23010] bridge0: port 2(bridge_slave_1) entered disabled state [ 1786.100328][T23010] device bridge_slave_1 entered promiscuous mode [ 1786.464180][T23009] device hsr_slave_0 entered promiscuous mode [ 1786.512711][T23009] device hsr_slave_1 entered promiscuous mode [ 1786.562534][T23009] debugfs: Directory 'hsr0' with parent '/' already present! [ 1786.578084][T23010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1786.759980][T23010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1786.806485][T23010] team0: Port device team_slave_0 added [ 1786.958515][T23010] team0: Port device team_slave_1 added [ 1787.024414][T23010] device hsr_slave_0 entered promiscuous mode [ 1787.062844][T23010] device hsr_slave_1 entered promiscuous mode [ 1787.112548][T23010] debugfs: Directory 'hsr0' with parent '/' already present! [ 1787.120255][T23014] chnl_net:caif_netlink_parms(): no params data found [ 1787.301628][T23014] bridge0: port 1(bridge_slave_0) entered blocking state [ 1787.309428][T23014] bridge0: port 1(bridge_slave_0) entered disabled state [ 1787.317108][T23014] device bridge_slave_0 entered promiscuous mode [ 1787.325788][T23014] bridge0: port 2(bridge_slave_1) entered blocking state [ 1787.333272][T23014] bridge0: port 2(bridge_slave_1) entered disabled state [ 1787.340871][T23014] device bridge_slave_1 entered promiscuous mode [ 1787.354987][T10647] device bridge_slave_1 left promiscuous mode [ 1787.361159][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1787.413832][T10647] device bridge_slave_0 left promiscuous mode [ 1787.420015][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1787.474951][T10647] device bridge_slave_1 left promiscuous mode [ 1787.481130][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1787.533478][T10647] device bridge_slave_0 left promiscuous mode [ 1787.539648][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1791.192680][T10647] device hsr_slave_0 left promiscuous mode [ 1791.242718][T10647] device hsr_slave_1 left promiscuous mode [ 1791.294790][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1791.307643][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1791.318966][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1791.356271][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1791.448870][T10647] bond0 (unregistering): Released all slaves [ 1791.593312][T10647] device hsr_slave_0 left promiscuous mode [ 1791.632649][T10647] device hsr_slave_1 left promiscuous mode [ 1791.684228][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1791.695270][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1791.708067][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1791.736892][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1791.829855][T10647] bond0 (unregistering): Released all slaves [ 1791.971592][T23014] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1791.983669][T23014] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1792.020494][T23014] team0: Port device team_slave_0 added [ 1792.029584][T23014] team0: Port device team_slave_1 added [ 1792.044644][T23009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1792.077477][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1792.085415][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1792.115130][T23014] device hsr_slave_0 entered promiscuous mode [ 1792.162791][T23014] device hsr_slave_1 entered promiscuous mode [ 1792.242591][T23014] debugfs: Directory 'hsr0' with parent '/' already present! [ 1792.252113][T23009] 8021q: adding VLAN 0 to HW filter on device team0 [ 1792.287437][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1792.296529][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1792.305311][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1792.312405][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1792.319957][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1792.328878][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1792.337238][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 1792.344317][ T8780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1792.351948][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1792.369880][T23010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1792.498528][T23010] 8021q: adding VLAN 0 to HW filter on device team0 [ 1792.507468][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1792.516699][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1792.525430][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1792.576686][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1792.586560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1792.595696][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1792.613130][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1792.621788][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1792.631215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1792.640217][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1792.649358][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 1792.656455][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1792.664864][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1792.673636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1792.682006][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 1792.689105][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1792.697354][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1792.706875][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1792.715922][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1792.724923][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1792.741491][T23009] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1792.754881][T23009] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1792.775626][T23014] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1792.785509][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1792.794279][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1792.802243][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1792.820380][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1792.831662][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1792.848836][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1792.857868][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1792.866747][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1792.875962][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1792.885144][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1792.894405][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1792.903276][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1792.916056][T23010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1792.928332][T23010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1792.950652][T23014] 8021q: adding VLAN 0 to HW filter on device team0 [ 1792.961759][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1792.970933][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1792.980291][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1792.992202][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1793.001395][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1793.025997][T23010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1793.049123][T23009] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1793.071732][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1793.089649][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1793.099881][T20998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1793.106988][T20998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1793.120999][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1793.130351][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1793.145469][T20998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1793.152569][T20998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1793.167510][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1793.177493][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1793.210952][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1793.219624][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1793.235598][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1793.248619][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1793.261078][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1793.274068][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1793.288616][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1793.298837][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1793.314632][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1793.330011][T23014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1793.349346][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1793.464213][T23014] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1793.537580][T23037] bridge0: port 2(bridge_slave_1) entered disabled state [ 1793.551408][T23037] bridge0: port 1(bridge_slave_0) entered disabled state [ 1794.250485][T23040] bridge0: port 2(bridge_slave_1) entered disabled state [ 1794.257928][T23040] bridge0: port 1(bridge_slave_0) entered disabled state 07:41:12 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:12 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:12 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:41:12 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xe, "6aa0d8a3430df333d742644b2157"}, &(0x7f0000000200)=0x16) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:13 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:13 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1795.535350][T23065] bridge0: port 2(bridge_slave_1) entered disabled state [ 1795.542786][T23065] bridge0: port 1(bridge_slave_0) entered disabled state 07:41:14 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:14 executing program 2: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:14 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:14 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xf, "6aa0d8a3430df333d742644b215767"}, &(0x7f0000000200)=0x17) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:14 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1796.667524][T23086] IPVS: ftp: loaded support on port[0] = 21 [ 1796.773411][T23086] chnl_net:caif_netlink_parms(): no params data found [ 1796.818597][T23086] bridge0: port 1(bridge_slave_0) entered blocking state [ 1796.827538][T23086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1796.835769][T23086] device bridge_slave_0 entered promiscuous mode [ 1796.843650][T23086] bridge0: port 2(bridge_slave_1) entered blocking state [ 1796.850772][T23086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1796.859038][T23086] device bridge_slave_1 entered promiscuous mode [ 1797.408173][T23086] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1797.419333][T23086] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1797.439112][T23086] team0: Port device team_slave_0 added [ 1797.447203][T23086] team0: Port device team_slave_1 added [ 1797.794428][T23086] device hsr_slave_0 entered promiscuous mode [ 1797.842837][T23086] device hsr_slave_1 entered promiscuous mode [ 1797.912429][T23086] debugfs: Directory 'hsr0' with parent '/' already present! [ 1797.935233][T23090] IPVS: ftp: loaded support on port[0] = 21 [ 1798.563204][T23090] chnl_net:caif_netlink_parms(): no params data found [ 1798.873782][T23090] bridge0: port 1(bridge_slave_0) entered blocking state [ 1798.880914][T23090] bridge0: port 1(bridge_slave_0) entered disabled state [ 1798.889010][T23090] device bridge_slave_0 entered promiscuous mode [ 1798.897269][T23090] bridge0: port 2(bridge_slave_1) entered blocking state [ 1798.904475][T23090] bridge0: port 2(bridge_slave_1) entered disabled state [ 1798.912172][T23090] device bridge_slave_1 entered promiscuous mode [ 1799.217873][T23090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1799.233307][T23090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1799.258210][T23086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1799.549328][T23090] team0: Port device team_slave_0 added [ 1799.556336][T23090] team0: Port device team_slave_1 added [ 1799.604784][T23090] device hsr_slave_0 entered promiscuous mode [ 1799.643571][T23090] device hsr_slave_1 entered promiscuous mode [ 1799.702560][T23090] debugfs: Directory 'hsr0' with parent '/' already present! [ 1799.715504][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1799.724020][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1800.015938][T23086] 8021q: adding VLAN 0 to HW filter on device team0 [ 1800.030450][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1800.040028][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1800.049137][ T8743] bridge0: port 1(bridge_slave_0) entered blocking state [ 1800.056251][ T8743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1800.076786][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1800.085463][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1800.094409][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1800.102799][ T8743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1800.109847][ T8743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1800.117732][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1800.423373][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1800.432028][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1800.441316][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1800.454202][T10647] device bridge_slave_1 left promiscuous mode [ 1800.460366][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1800.513661][T10647] device bridge_slave_0 left promiscuous mode [ 1800.519835][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1800.575005][T10647] device bridge_slave_1 left promiscuous mode [ 1800.581166][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1800.633595][T10647] device bridge_slave_0 left promiscuous mode [ 1800.639807][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1800.674771][T10647] device bridge_slave_1 left promiscuous mode [ 1800.680954][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1800.713637][T10647] device bridge_slave_0 left promiscuous mode [ 1800.719844][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1800.774628][T10647] device bridge_slave_1 left promiscuous mode [ 1800.780857][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1800.813775][T10647] device bridge_slave_0 left promiscuous mode [ 1800.819964][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1808.012980][T10647] device hsr_slave_0 left promiscuous mode [ 1808.052477][T10647] device hsr_slave_1 left promiscuous mode [ 1808.119673][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1808.134175][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1808.145542][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1808.189018][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1808.288962][T10647] bond0 (unregistering): Released all slaves [ 1808.423117][T10647] device hsr_slave_0 left promiscuous mode [ 1808.462668][T10647] device hsr_slave_1 left promiscuous mode [ 1808.535648][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1808.548718][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1808.560699][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1808.597035][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1808.692253][T10647] bond0 (unregistering): Released all slaves [ 1808.833328][T10647] device hsr_slave_0 left promiscuous mode [ 1808.882525][T10647] device hsr_slave_1 left promiscuous mode [ 1808.931429][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1808.946868][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1808.958627][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1808.987829][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1809.056851][T10647] bond0 (unregistering): Released all slaves [ 1809.213434][T10647] device hsr_slave_0 left promiscuous mode [ 1809.262500][T10647] device hsr_slave_1 left promiscuous mode [ 1809.323967][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1809.336086][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1809.347166][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1809.419740][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1809.490336][T10647] bond0 (unregistering): Released all slaves [ 1809.613281][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1809.621052][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1809.631280][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1809.645570][T23086] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1809.656252][T23086] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1809.670900][T23090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1809.678487][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1809.678975][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1809.695761][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1809.704348][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1809.723226][T23086] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1809.733447][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1809.755691][T23090] 8021q: adding VLAN 0 to HW filter on device team0 [ 1809.765368][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1809.773754][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1809.793170][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1809.801638][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1809.810415][ T2998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1809.817530][ T2998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1809.826339][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1809.839711][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1809.848660][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1809.857564][ T8743] bridge0: port 2(bridge_slave_1) entered blocking state [ 1809.864648][ T8743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1809.877922][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1809.896215][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1809.908619][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1809.917816][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1809.941071][ T8743] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1809.979901][T23090] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1809.992570][T23090] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1810.005577][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1810.014258][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1810.022714][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1810.030925][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1810.039405][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1810.047621][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1810.057012][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:41:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vxcan1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="ecee8b1483f4"}, 0x14) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 07:41:28 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) read$alg(r0, 0x0, 0x0) 07:41:28 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:28 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:28 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1810.116217][T23090] 8021q: adding VLAN 0 to HW filter on device batadv0 07:41:28 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:28 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:29 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) [ 1810.645919][T23125] bridge0: port 2(bridge_slave_1) entered disabled state [ 1810.655377][T23125] bridge0: port 1(bridge_slave_0) entered disabled state 07:41:29 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) read$alg(r0, 0x0, 0xffffff86) 07:41:30 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xf, "6aa0d8a3430df333d742644b215767"}, &(0x7f0000000200)=0x17) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:30 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0xf}}, 0x0) 07:41:30 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000002"], 0x48}}, 0x0) 07:41:30 executing program 4: r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x5}) mq_timedreceive(r0, &(0x7f0000000040)=""/50, 0x32, 0x20000040, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) [ 1812.423457][T23151] IPVS: ftp: loaded support on port[0] = 21 [ 1812.537170][T23151] chnl_net:caif_netlink_parms(): no params data found [ 1812.574150][T23151] bridge0: port 1(bridge_slave_0) entered blocking state [ 1812.581316][T23151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1812.589323][T23151] device bridge_slave_0 entered promiscuous mode [ 1812.597541][T23151] bridge0: port 2(bridge_slave_1) entered blocking state [ 1812.604711][T23151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1812.612780][T23151] device bridge_slave_1 entered promiscuous mode [ 1812.631845][T23151] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1812.643181][T23151] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1812.664198][T23151] team0: Port device team_slave_0 added [ 1812.670845][T23151] team0: Port device team_slave_1 added [ 1812.740294][T23151] device hsr_slave_0 entered promiscuous mode [ 1812.782689][T23151] device hsr_slave_1 entered promiscuous mode [ 1812.880072][T23151] bridge0: port 2(bridge_slave_1) entered blocking state [ 1812.887180][T23151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1812.894560][T23151] bridge0: port 1(bridge_slave_0) entered blocking state [ 1812.901638][T23151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1812.947821][T23151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1812.963849][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1812.972249][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 1812.980395][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 1812.994595][T23151] 8021q: adding VLAN 0 to HW filter on device team0 [ 1813.012135][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1813.021189][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1813.028289][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1813.054907][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1813.063695][T20998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1813.070743][T20998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1813.079382][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1813.099402][T23151] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1813.110137][T23151] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1813.123555][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1813.131624][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1813.141071][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1813.149844][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1813.170022][T23151] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1813.177984][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:41:31 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0xc0}}, 0x0) 07:41:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0xfffffffffffffe78}}]}, 0x13c}}, 0x0) 07:41:31 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) connect(r0, &(0x7f0000000280)=@sco, 0x80) [ 1813.530068][T23170] IPVS: ftp: loaded support on port[0] = 21 [ 1813.667177][T23170] chnl_net:caif_netlink_parms(): no params data found [ 1813.694432][T23170] bridge0: port 1(bridge_slave_0) entered blocking state [ 1813.701547][T23170] bridge0: port 1(bridge_slave_0) entered disabled state [ 1813.709382][T23170] device bridge_slave_0 entered promiscuous mode [ 1813.717576][T23170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1813.724962][T23170] bridge0: port 2(bridge_slave_1) entered disabled state [ 1813.733051][T23170] device bridge_slave_1 entered promiscuous mode [ 1813.751254][T23170] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1813.762265][T23170] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1813.785238][T23170] team0: Port device team_slave_0 added [ 1813.791817][T23170] team0: Port device team_slave_1 added [ 1813.866098][T23170] device hsr_slave_0 entered promiscuous mode [ 1813.902875][T23170] device hsr_slave_1 entered promiscuous mode [ 1813.942563][T23170] debugfs: Directory 'hsr0' with parent '/' already present! [ 1813.957428][T23170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1813.964495][T23170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1813.971766][T23170] bridge0: port 1(bridge_slave_0) entered blocking state [ 1813.978867][T23170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1814.028158][T23170] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1814.041782][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1814.052071][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 1814.060297][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 1814.074646][T23170] 8021q: adding VLAN 0 to HW filter on device team0 [ 1814.087092][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1814.096133][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 1814.103214][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1814.124012][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1814.134792][T21771] bridge0: port 2(bridge_slave_1) entered blocking state [ 1814.141828][T21771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1814.160130][T23170] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1814.172292][T23170] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1814.186590][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1814.195445][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1814.204109][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1814.212292][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1814.221543][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1814.229865][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1814.249451][T23170] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1814.613621][T23181] bridge0: port 2(bridge_slave_1) entered disabled state [ 1814.623096][T23181] bridge0: port 1(bridge_slave_0) entered disabled state 07:41:33 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:33 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xf, "6aa0d8a3430df333d742644b215767"}, &(0x7f0000000200)=0x17) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:33 executing program 4: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [], 0x7, 0x9, 0x8, 0x3, 0x3}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 07:41:33 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000004"], 0x48}}, 0x0) 07:41:33 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, 0x0, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, 0x0, &(0x7f00000003c0)) timer_create(0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) setregid(0x0, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x24) setregid(0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, 0x0, 0x0, r1}, 0x68) r2 = getgid() setregid(0x0, r2) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x6, 0x1) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) 07:41:33 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0xec0}}, 0x0) 07:41:33 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x33fe0}}, 0x0) 07:41:34 executing program 2: r0 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@loopback}, 0x14) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000000c0), 0x8000000000001fa, 0x0) 07:41:34 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000a"], 0x48}}, 0x0) 07:41:34 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x20000108}}, 0x0) 07:41:34 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000e"], 0x48}}, 0x0) 07:41:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x18, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) 07:41:35 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1817.164380][T10647] device bridge_slave_1 left promiscuous mode [ 1817.170575][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1817.223626][T10647] device bridge_slave_0 left promiscuous mode [ 1817.229811][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1819.062828][T10647] device hsr_slave_0 left promiscuous mode [ 1819.122649][T10647] device hsr_slave_1 left promiscuous mode [ 1819.170085][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1819.183940][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1819.194979][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1819.279084][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1819.348490][T10647] bond0 (unregistering): Released all slaves [ 1819.495557][T23225] IPVS: ftp: loaded support on port[0] = 21 [ 1819.561483][T23225] chnl_net:caif_netlink_parms(): no params data found [ 1819.589914][T23225] bridge0: port 1(bridge_slave_0) entered blocking state [ 1819.597156][T23225] bridge0: port 1(bridge_slave_0) entered disabled state [ 1819.607276][T23225] device bridge_slave_0 entered promiscuous mode [ 1819.616292][T23225] bridge0: port 2(bridge_slave_1) entered blocking state [ 1819.624225][T23225] bridge0: port 2(bridge_slave_1) entered disabled state [ 1819.631809][T23225] device bridge_slave_1 entered promiscuous mode [ 1819.653712][T23225] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1819.664861][T23225] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1819.737622][T23225] team0: Port device team_slave_0 added [ 1819.745623][T23225] team0: Port device team_slave_1 added [ 1819.805575][T23225] device hsr_slave_0 entered promiscuous mode [ 1819.848630][T23225] device hsr_slave_1 entered promiscuous mode [ 1819.902481][T23225] debugfs: Directory 'hsr0' with parent '/' already present! [ 1819.928206][T23225] bridge0: port 2(bridge_slave_1) entered blocking state [ 1819.935318][T23225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1819.942694][T23225] bridge0: port 1(bridge_slave_0) entered blocking state [ 1819.949744][T23225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1820.020339][T23225] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1820.042110][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1820.058527][T20998] bridge0: port 1(bridge_slave_0) entered disabled state [ 1820.068441][T20998] bridge0: port 2(bridge_slave_1) entered disabled state [ 1820.089577][T23225] 8021q: adding VLAN 0 to HW filter on device team0 [ 1820.101636][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1820.111133][T20998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1820.118242][T20998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1820.136573][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1820.145249][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1820.152305][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1820.180263][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1820.196106][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1820.219043][T23225] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1820.236259][T23225] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1820.251387][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1820.266035][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1820.277999][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1820.301854][T23225] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1820.317349][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1820.528639][T23233] bridge0: port 2(bridge_slave_1) entered disabled state [ 1820.538253][T23233] bridge0: port 1(bridge_slave_0) entered disabled state 07:41:39 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:39 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500000f"], 0x48}}, 0x0) 07:41:39 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x7ffff000}}, 0x0) 07:41:39 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) read$alg(r0, 0x0, 0xffffff86) 07:41:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000019c0)='/', 0x1) 07:41:39 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:39 executing program 2: 07:41:39 executing program 4: 07:41:40 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) connect(r0, &(0x7f0000000280)=@sco, 0x80) 07:41:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfff2, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x2020000002, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, &(0x7f0000000040)='%', 0x1, 0x0, 0x0, 0xfd24) close(r0) 07:41:40 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0xfffffdef}}, 0x0) 07:41:40 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000060"], 0x48}}, 0x0) 07:41:40 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=ANY=[@ANYBLOB="850000000800000065200000000000009500000000000000"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) 07:41:40 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000004c0)={[], 0x0, 0x0, 0x86, 0x81}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x402c542c, &(0x7f0000000100)) r4 = fcntl$dupfd(r3, 0x0, r0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, 0xffffffffffffffff, &(0x7f0000000400)={0x9000000a}) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r6, 0x4080aea1, 0x0) ioctl$NBD_SET_FLAGS(r6, 0xab0a, 0x4400000) write(r2, &(0x7f0000000600)="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", 0xe00) sendfile(r2, r5, 0x0, 0xad9f) sendfile(r2, r5, 0x0, 0x12000) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x2, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="00000000000000001800000003000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x70) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @rand_addr=0x4}, 0xc) sendmsg$nl_route(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 07:41:40 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x2}, 0x0) 07:41:40 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500009e"], 0x48}}, 0x0) [ 1822.460124][ T26] audit: type=1800 audit(1568014901.044:45): pid=23277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16959 res=0 [ 1823.780811][T23287] IPVS: ftp: loaded support on port[0] = 21 [ 1824.107382][T23287] chnl_net:caif_netlink_parms(): no params data found [ 1824.136553][T23287] bridge0: port 1(bridge_slave_0) entered blocking state [ 1824.143978][T23287] bridge0: port 1(bridge_slave_0) entered disabled state [ 1824.151514][T23287] device bridge_slave_0 entered promiscuous mode [ 1824.159431][T23287] bridge0: port 2(bridge_slave_1) entered blocking state [ 1824.166597][T23287] bridge0: port 2(bridge_slave_1) entered disabled state [ 1824.174447][T23287] device bridge_slave_1 entered promiscuous mode [ 1824.323475][T23287] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1824.334766][T23287] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1824.351928][T23287] team0: Port device team_slave_0 added [ 1824.360032][T23287] team0: Port device team_slave_1 added [ 1824.544104][T23287] device hsr_slave_0 entered promiscuous mode [ 1824.592900][T23287] device hsr_slave_1 entered promiscuous mode [ 1824.662602][T23287] debugfs: Directory 'hsr0' with parent '/' already present! [ 1824.808337][T23287] bridge0: port 2(bridge_slave_1) entered blocking state [ 1824.815453][T23287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1824.822833][T23287] bridge0: port 1(bridge_slave_0) entered blocking state [ 1824.829875][T23287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1824.995899][T23287] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1825.003569][ T8780] bridge0: port 1(bridge_slave_0) entered disabled state [ 1825.011194][ T8780] bridge0: port 2(bridge_slave_1) entered disabled state [ 1825.019903][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1825.170658][T23287] 8021q: adding VLAN 0 to HW filter on device team0 [ 1825.177951][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1825.186303][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1825.202625][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1825.211210][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1825.220291][T16975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1825.227368][T16975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1825.235033][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1825.244411][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1825.252843][T16975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1825.259912][T16975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1825.267535][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1825.276059][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1825.284750][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1825.293154][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1825.304098][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1825.311789][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1825.320285][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1825.336781][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1825.345041][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1825.355204][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1825.363880][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1825.374006][T23287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1825.384335][T10647] device bridge_slave_1 left promiscuous mode [ 1825.390538][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1825.453370][T10647] device bridge_slave_0 left promiscuous mode [ 1825.459699][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1825.524445][T10647] device bridge_slave_1 left promiscuous mode [ 1825.530618][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1825.586961][T10647] device bridge_slave_0 left promiscuous mode [ 1825.593360][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1829.143116][T10647] device hsr_slave_0 left promiscuous mode [ 1829.182567][T10647] device hsr_slave_1 left promiscuous mode [ 1829.260376][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1829.273623][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1829.284590][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1829.368559][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1829.451315][T10647] bond0 (unregistering): Released all slaves [ 1829.603111][T10647] device hsr_slave_0 left promiscuous mode [ 1829.642533][T10647] device hsr_slave_1 left promiscuous mode [ 1829.692751][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1829.705684][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1829.716702][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1829.747762][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1829.848540][T10647] bond0 (unregistering): Released all slaves [ 1829.950949][T23287] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1830.195881][T23295] bridge0: port 2(bridge_slave_1) entered disabled state [ 1830.204887][T23295] bridge0: port 1(bridge_slave_0) entered disabled state 07:41:49 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:49 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:49 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) 07:41:49 executing program 2: 07:41:49 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x8}, 0x0) 07:41:49 executing program 4: 07:41:49 executing program 4: 07:41:49 executing program 2: 07:41:49 executing program 4: 07:41:49 executing program 2: 07:41:49 executing program 4: 07:41:49 executing program 2: 07:41:50 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1833.211703][T23322] IPVS: ftp: loaded support on port[0] = 21 [ 1833.410940][T23322] chnl_net:caif_netlink_parms(): no params data found [ 1833.436372][T23322] bridge0: port 1(bridge_slave_0) entered blocking state [ 1833.443578][T23322] bridge0: port 1(bridge_slave_0) entered disabled state [ 1833.451130][T23322] device bridge_slave_0 entered promiscuous mode [ 1833.459033][T23322] bridge0: port 2(bridge_slave_1) entered blocking state [ 1833.466221][T23322] bridge0: port 2(bridge_slave_1) entered disabled state [ 1833.474218][T23322] device bridge_slave_1 entered promiscuous mode [ 1833.554855][T23322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1833.566050][T23322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1833.583837][T23322] team0: Port device team_slave_0 added [ 1833.590760][T23322] team0: Port device team_slave_1 added [ 1833.704829][T23322] device hsr_slave_0 entered promiscuous mode [ 1833.742788][T23322] device hsr_slave_1 entered promiscuous mode [ 1833.812524][T23322] debugfs: Directory 'hsr0' with parent '/' already present! [ 1833.919220][T23322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1833.930674][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1833.940584][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1834.018263][T23322] 8021q: adding VLAN 0 to HW filter on device team0 [ 1834.028748][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1834.037917][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1834.046999][T21134] bridge0: port 1(bridge_slave_0) entered blocking state [ 1834.054103][T21134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1834.062688][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1834.144487][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1834.153772][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1834.162126][T17571] bridge0: port 2(bridge_slave_1) entered blocking state [ 1834.169222][T17571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1834.184318][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1834.193247][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1834.201682][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1834.210885][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1834.219793][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1834.293545][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1834.302200][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1834.310934][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1834.319325][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1834.328304][T10647] device bridge_slave_1 left promiscuous mode [ 1834.336370][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1834.394158][T10647] device bridge_slave_0 left promiscuous mode [ 1834.400351][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1836.143079][T10647] device hsr_slave_0 left promiscuous mode [ 1836.212635][T10647] device hsr_slave_1 left promiscuous mode [ 1836.280028][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1836.293503][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1836.304406][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1836.368766][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1836.460091][T10647] bond0 (unregistering): Released all slaves [ 1836.559708][T23322] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1836.570932][T23322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1836.584105][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1836.596144][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1836.620927][T23322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1836.761654][T23329] bridge0: port 2(bridge_slave_1) entered disabled state [ 1836.771105][T23329] bridge0: port 1(bridge_slave_0) entered disabled state 07:41:56 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:56 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x0, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:41:56 executing program 2: 07:41:56 executing program 4: 07:41:56 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0xffffff1f}, 0x0) 07:41:56 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:41:56 executing program 4: 07:41:56 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x2}, 0x0) 07:41:56 executing program 2: 07:41:56 executing program 4: getpid() r0 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) memfd_create(&(0x7f0000000740)='Y\xcd\x92\xde\xf3\t\x00\x00\x00\x00\x00\x00\x00=|Tf?\xfb\xbbt\xbb\x91\xbf$\xaeb\x1f\x8c\x10\x96\xe0\nK\xed\xfb\r\x06\xf1S\xee\b3\";N\xafpB9\xc5V|*d\xc1\x9a\x97\xe6\x16<\x8cE0LF^s\xa7j\xd0(\xa6ma@\xbe\xcd\xf1\xd0Q\xebn\x10\"\xe0w\xf7,C\xf2T\x16L\xfe\xd9-\x8c\xc7\xf5[\x91\xcb\xdeU@\xf0w?\x91\xad\xa3\xc2\xbbQKZ\x8c:\x82\xe9\xcd\b2|k\xd8>\x88\x8f\x9a\x10\xbd\xbe|\xc5\xd9\xc4Is\x0e\xc4\xa4\xe9Lv\xf24gr\xdaT\xb6\xca5\xf3G\xac\n\x13\xa8\xd0\xf4\x9c\x95\x02k\x14\x9a\xbd\xd1.\xd6\x15\x18]r\xe4A\xc2$\xd7\xf0Y\xd1\xde\x85R#J\xb0,\x830bB8\xa4;o\xf7*f&K\x03K\x94\x84\x8d/\xac5\xd2\xf3\xac/+?\xa1\xc4\xefx\x14L\xf4\x16\'\xb0o\x1bY[\n\xbc\x12\xd2\xd6\x84\xcd\xafY.Ci_\x83h\x9c\x1apZ#\xff\x7f^\xaf\xb2\xfa\xf0\xa3\xe8}E\x96\x9c\x9d\x93\x12\v\x02\x85\xa6\xb27\x8cBm\xcb\x80r\xf4\xa64\xff\xf2\xb4\"\x8d!\a\xea\x15dT\n\xf5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 07:41:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000480)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r2, 0x409, 0x8) 07:41:57 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000140)={0x0, "e89b960bc1445f8018553b0103857500c155def3f0d3ac71fcc9cb8c34ebeee7"}) [ 1839.985567][T23384] IPVS: ftp: loaded support on port[0] = 21 [ 1840.047384][T23384] chnl_net:caif_netlink_parms(): no params data found [ 1840.074653][T23384] bridge0: port 1(bridge_slave_0) entered blocking state [ 1840.081770][T23384] bridge0: port 1(bridge_slave_0) entered disabled state [ 1840.089566][T23384] device bridge_slave_0 entered promiscuous mode [ 1840.349841][T23384] bridge0: port 2(bridge_slave_1) entered blocking state [ 1840.357219][T23384] bridge0: port 2(bridge_slave_1) entered disabled state [ 1840.366355][T23384] device bridge_slave_1 entered promiscuous mode [ 1840.383923][T23384] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1840.521796][T23384] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1840.541407][T23384] team0: Port device team_slave_0 added [ 1840.548491][T23384] team0: Port device team_slave_1 added [ 1840.716028][T23384] device hsr_slave_0 entered promiscuous mode [ 1840.762841][T23384] device hsr_slave_1 entered promiscuous mode [ 1840.812637][T23384] debugfs: Directory 'hsr0' with parent '/' already present! [ 1840.978404][T23384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1840.990385][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1840.999551][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1841.010223][T23384] 8021q: adding VLAN 0 to HW filter on device team0 [ 1841.153665][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1841.162241][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1841.170655][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1841.177714][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1841.185974][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1841.195050][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1841.203780][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1841.210857][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1841.218487][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1841.228420][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1841.374832][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1841.383798][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1841.392258][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1841.400668][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1841.409603][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1841.424793][T23384] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1841.435739][T23384] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1841.579329][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1841.587320][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1841.595873][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1841.605040][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1841.613642][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1841.622149][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1841.776779][T23384] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1842.004095][T10647] device bridge_slave_1 left promiscuous mode [ 1842.027110][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1842.083701][T10647] device bridge_slave_0 left promiscuous mode [ 1842.089874][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1842.144277][T10647] device bridge_slave_1 left promiscuous mode [ 1842.150440][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1842.193250][T10647] device bridge_slave_0 left promiscuous mode [ 1842.199452][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1845.793109][T10647] device hsr_slave_0 left promiscuous mode [ 1845.852695][T10647] device hsr_slave_1 left promiscuous mode [ 1845.903229][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1845.914959][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1845.926121][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1845.996590][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1846.079835][T10647] bond0 (unregistering): Released all slaves [ 1846.263991][T10647] device hsr_slave_0 left promiscuous mode [ 1846.312609][T10647] device hsr_slave_1 left promiscuous mode [ 1846.382076][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1846.395210][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1846.405959][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1846.449604][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1846.538690][T10647] bond0 (unregistering): Released all slaves [ 1846.710743][T23393] bridge0: port 2(bridge_slave_1) entered disabled state [ 1846.718165][T23393] bridge0: port 1(bridge_slave_0) entered disabled state 07:42:05 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x0, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:05 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:05 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xa}, 0x0) 07:42:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x724201}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000801}, 0x4000) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') pipe2(0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, 0x0) accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x1, 0x910c0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000040)={{0x5}}) 07:42:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffc0}, 0x48) 07:42:05 executing program 4: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {}, [{}, {}, {}, {}]}, 0x44, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) 07:42:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,H^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 07:42:05 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xe}, 0x0) 07:42:06 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:06 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xf}, 0x0) 07:42:06 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x0, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1848.925518][T23436] IPVS: ftp: loaded support on port[0] = 21 [ 1849.059131][T23436] chnl_net:caif_netlink_parms(): no params data found [ 1849.110398][T23436] bridge0: port 1(bridge_slave_0) entered blocking state [ 1849.121729][T23436] bridge0: port 1(bridge_slave_0) entered disabled state [ 1849.130821][T23436] device bridge_slave_0 entered promiscuous mode [ 1849.144383][T23436] bridge0: port 2(bridge_slave_1) entered blocking state [ 1849.151498][T23436] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.165774][T23436] device bridge_slave_1 entered promiscuous mode [ 1849.190756][T23436] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1849.201928][T23436] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1849.231815][T23436] team0: Port device team_slave_0 added [ 1849.244469][T23436] team0: Port device team_slave_1 added [ 1849.304624][T23436] device hsr_slave_0 entered promiscuous mode [ 1849.362944][T23436] device hsr_slave_1 entered promiscuous mode [ 1849.413091][T23436] bridge0: port 2(bridge_slave_1) entered blocking state [ 1849.420148][T23436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1849.427513][T23436] bridge0: port 1(bridge_slave_0) entered blocking state [ 1849.434617][T23436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1849.469973][T23436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1849.482068][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1849.491541][T20998] bridge0: port 1(bridge_slave_0) entered disabled state [ 1849.499849][T20998] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.512267][T23436] 8021q: adding VLAN 0 to HW filter on device team0 [ 1849.536818][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1849.548690][T16975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1849.555793][T16975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1849.574743][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1849.588848][T16975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1849.595969][T16975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1849.631923][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1849.641111][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1849.656840][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1849.674710][T23436] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1849.688069][T23436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1849.708706][T23436] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1849.718361][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1849.727163][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1849.875503][T23439] IPVS: ftp: loaded support on port[0] = 21 [ 1850.256298][T23439] chnl_net:caif_netlink_parms(): no params data found [ 1850.286046][T23439] bridge0: port 1(bridge_slave_0) entered blocking state [ 1850.293337][T23439] bridge0: port 1(bridge_slave_0) entered disabled state [ 1850.301036][T23439] device bridge_slave_0 entered promiscuous mode [ 1850.308969][T23439] bridge0: port 2(bridge_slave_1) entered blocking state [ 1850.316193][T23439] bridge0: port 2(bridge_slave_1) entered disabled state [ 1850.324183][T23439] device bridge_slave_1 entered promiscuous mode [ 1850.407966][T23439] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1850.421808][T23439] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1850.441747][T23439] team0: Port device team_slave_0 added [ 1850.517416][T23439] team0: Port device team_slave_1 added [ 1850.584166][T23439] device hsr_slave_0 entered promiscuous mode [ 1850.622685][T23439] device hsr_slave_1 entered promiscuous mode [ 1850.672522][T23439] debugfs: Directory 'hsr0' with parent '/' already present! [ 1850.751233][T23439] bridge0: port 2(bridge_slave_1) entered blocking state [ 1850.758423][T23439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1850.765772][T23439] bridge0: port 1(bridge_slave_0) entered blocking state [ 1850.772855][T23439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1850.881079][T23439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1850.893417][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1850.901275][T20998] bridge0: port 1(bridge_slave_0) entered disabled state [ 1850.909233][T20998] bridge0: port 2(bridge_slave_1) entered disabled state [ 1850.921693][T23439] 8021q: adding VLAN 0 to HW filter on device team0 [ 1851.002612][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1851.011190][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1851.019851][T20998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1851.026921][T20998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1851.034571][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1851.043660][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1851.052646][T20998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1851.059674][T20998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1851.067223][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1851.082262][T10647] device bridge_slave_1 left promiscuous mode [ 1851.089323][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1851.133549][T10647] device bridge_slave_0 left promiscuous mode [ 1851.139717][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1852.913016][T10647] device hsr_slave_0 left promiscuous mode [ 1852.952630][T10647] device hsr_slave_1 left promiscuous mode [ 1853.002450][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1853.013560][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1853.024872][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1853.077305][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1853.178745][T10647] bond0 (unregistering): Released all slaves [ 1853.286964][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1853.295630][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1853.304320][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1853.318901][T23439] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1853.329477][T23439] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1853.342628][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1853.350347][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1853.359027][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1853.367424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1853.376004][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1853.384341][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1853.392655][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1853.400856][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1853.430886][T23439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1853.675629][T23456] bridge0: port 2(bridge_slave_1) entered disabled state [ 1853.685127][T23456] bridge0: port 1(bridge_slave_0) entered disabled state 07:42:13 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:13 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x0, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 07:42:13 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f000002eff0), 0x10) 07:42:13 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x60}, 0x0) 07:42:13 executing program 4: gettid() timer_create(0x2, 0x0, &(0x7f0000044000)) 07:42:13 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004340)={[{@fat=@gid={'gid'}}]}) [ 1854.811512][T23474] FAT-fs (loop2): bogus number of reserved sectors 07:42:13 executing program 4: socket$unix(0x1, 0x1, 0x0) pipe(&(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) semget(0x3, 0x2, 0x40) 07:42:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1854.852704][T23474] FAT-fs (loop2): Can't find a valid FAT filesystem 07:42:13 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xa5}, 0x0) [ 1855.000368][T23474] FAT-fs (loop2): bogus number of reserved sectors [ 1855.026360][T23474] FAT-fs (loop2): Can't find a valid FAT filesystem 07:42:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:14 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:14 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f0000000180)='./file0/../file0\x00', 0x0) [ 1856.856105][T23509] IPVS: ftp: loaded support on port[0] = 21 [ 1857.047921][T23509] chnl_net:caif_netlink_parms(): no params data found [ 1857.143137][T23509] bridge0: port 1(bridge_slave_0) entered blocking state [ 1857.150317][T23509] bridge0: port 1(bridge_slave_0) entered disabled state [ 1857.158375][T23509] device bridge_slave_0 entered promiscuous mode [ 1857.166155][T23509] bridge0: port 2(bridge_slave_1) entered blocking state [ 1857.173356][T23509] bridge0: port 2(bridge_slave_1) entered disabled state [ 1857.180905][T23509] device bridge_slave_1 entered promiscuous mode [ 1857.264226][T23509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1857.275276][T23509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1857.292590][T23509] team0: Port device team_slave_0 added [ 1857.299384][T23509] team0: Port device team_slave_1 added [ 1857.315376][T10647] device bridge_slave_1 left promiscuous mode [ 1857.321554][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1857.373501][T10647] device bridge_slave_0 left promiscuous mode [ 1857.379706][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1859.133040][T10647] device hsr_slave_0 left promiscuous mode [ 1859.182569][T10647] device hsr_slave_1 left promiscuous mode [ 1859.269949][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1859.283957][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1859.295405][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1859.338925][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1859.428256][T10647] bond0 (unregistering): Released all slaves [ 1859.594479][T23509] device hsr_slave_0 entered promiscuous mode [ 1859.642836][T23509] device hsr_slave_1 entered promiscuous mode [ 1859.712415][T23509] debugfs: Directory 'hsr0' with parent '/' already present! [ 1859.761337][T23509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1859.774569][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1859.782219][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1859.794082][T23509] 8021q: adding VLAN 0 to HW filter on device team0 [ 1859.861374][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1859.872054][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1859.886232][T21134] bridge0: port 1(bridge_slave_0) entered blocking state [ 1859.893342][T21134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1859.914510][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1859.926862][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1859.936649][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1859.951146][T21134] bridge0: port 2(bridge_slave_1) entered blocking state [ 1859.958257][T21134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1859.971227][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1859.980102][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1859.994097][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1860.006947][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1860.030008][T23509] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1860.040992][T23509] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1860.061096][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1860.070087][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1860.088725][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1860.101094][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1860.116122][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1860.127019][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1860.139288][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1860.165784][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1860.182149][T23509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1860.378032][T23517] bridge0: port 2(bridge_slave_1) entered disabled state [ 1860.392245][T23517] bridge0: port 1(bridge_slave_0) entered disabled state 07:42:19 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:19 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xf0}, 0x0) 07:42:19 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) chdir(&(0x7f0000000280)='./file0\x00') symlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='./file0\x00') 07:42:19 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:19 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x0, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:19 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x12d8}, 0x1, 0x0, 0x0, 0x40000}, 0x400c0) [ 1861.223080][T23526] netlink: 4724 bytes leftover after parsing attributes in process `syz-executor.4'. 07:42:19 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400)=0x0, &(0x7f0000000440)) stat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet6(0xa, 0x0, 0x10000) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp\x00'}, &(0x7f00000003c0)=0x1e) r3 = getgid() setregid(0x0, r3) getgid() stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r4, 0x40101283, 0x0) r5 = getgid() setregid(0x0, r5) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32, @ANYBLOB="040006000000000008000000", @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000400000000002000010000000000"], 0x9, 0x1) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="40f2bb00000000000b001b000000"], 0x30}}, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:42:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {0x10000}, {}, {}, {}, {}, 0xfffffffffffffffa, 0x0, 0x0, 0x100a0, 0x0, 0x3d00}) 07:42:20 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:20 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xa00}, 0x0) 07:42:20 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000ff"], 0x48}}, 0x0) [ 1862.085249][T23534] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 1862.103053][T23534] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 07:42:20 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xe00}, 0x0) 07:42:20 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:21 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xf00}, 0x0) 07:42:21 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1864.520871][T23534] bridge0: port 2(bridge_slave_1) entered disabled state [ 1864.528236][T23534] bridge0: port 1(bridge_slave_0) entered disabled state [ 1867.762469][T23536] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 1867.770661][T23536] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1867.788500][T23573] IPVS: ftp: loaded support on port[0] = 21 [ 1868.026255][T23573] chnl_net:caif_netlink_parms(): no params data found [ 1868.074844][T23573] bridge0: port 1(bridge_slave_0) entered blocking state [ 1868.081969][T23573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1868.090198][T23573] device bridge_slave_0 entered promiscuous mode [ 1868.103142][T23573] bridge0: port 2(bridge_slave_1) entered blocking state [ 1868.110191][T23573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1868.124162][T23573] device bridge_slave_1 entered promiscuous mode [ 1868.148524][T23573] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1868.168506][T23573] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1868.330306][T23573] team0: Port device team_slave_0 added [ 1868.337620][T23573] team0: Port device team_slave_1 added [ 1868.385899][T23573] device hsr_slave_0 entered promiscuous mode [ 1868.443098][T23573] device hsr_slave_1 entered promiscuous mode [ 1868.482489][T23573] debugfs: Directory 'hsr0' with parent '/' already present! [ 1868.559486][T23573] bridge0: port 2(bridge_slave_1) entered blocking state [ 1868.566572][T23573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1868.573932][T23573] bridge0: port 1(bridge_slave_0) entered blocking state [ 1868.580972][T23573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1868.694490][T23573] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1868.708832][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1868.716727][ T2998] bridge0: port 1(bridge_slave_0) entered disabled state [ 1868.725544][ T2998] bridge0: port 2(bridge_slave_1) entered disabled state [ 1868.804244][T23573] 8021q: adding VLAN 0 to HW filter on device team0 [ 1868.813939][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1868.822939][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1868.831240][T17571] bridge0: port 1(bridge_slave_0) entered blocking state [ 1868.838312][T17571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1868.925577][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1868.934331][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1868.943074][T16975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1868.950113][T16975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1868.958016][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1868.966455][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1868.975167][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1868.983692][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1868.991904][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1869.000415][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1869.009869][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1869.089318][T23573] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1869.100012][T23573] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1869.111971][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1869.120814][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1869.129912][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1869.138995][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1869.147581][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1869.230922][T23573] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1869.494068][T23582] bridge0: port 2(bridge_slave_1) entered disabled state [ 1869.503183][T23582] bridge0: port 1(bridge_slave_0) entered disabled state 07:42:28 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1870.083177][T10647] device bridge_slave_1 left promiscuous mode [ 1870.089411][T10647] bridge0: port 2(bridge_slave_1) entered disabled state 07:42:28 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:28 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x4000}, 0x0) 07:42:28 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x0, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:28 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400)=0x0, &(0x7f0000000440)) stat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet6(0xa, 0x0, 0x10000) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000180)={'icmp\x00'}, &(0x7f00000003c0)=0x1e) r3 = getgid() setregid(0x0, r3) getgid() stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r4, 0x40101283, 0x0) r5 = getgid() setregid(0x0, r5) lsetxattr$system_posix_acl(0x0, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32, @ANYBLOB="040006000000000008000000", @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000400000000002000010000000000"], 0x9, 0x1) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="40f2bb00000000000b001b000000"], 0x30}}, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:42:28 executing program 2: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000000)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) keyctl$get_security(0x11, r0, &(0x7f0000000040)=""/176, 0xb0) 07:42:28 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) pwritev(r0, &(0x7f00000005c0)=[{&(0x7f00000004c0)="df", 0x1}], 0x1, 0x2) 07:42:28 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x6000}, 0x0) 07:42:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 1870.359650][T10647] device bridge_slave_0 left promiscuous mode [ 1870.369259][T10647] bridge0: port 1(bridge_slave_0) entered disabled state 07:42:29 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 07:42:29 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xa500}, 0x0) [ 1873.062795][T10647] device hsr_slave_0 left promiscuous mode [ 1873.132627][T10647] device hsr_slave_1 left promiscuous mode [ 1873.191978][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1873.205100][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1873.215666][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1873.277259][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1873.364346][T10647] bond0 (unregistering): Released all slaves [ 1873.566491][T23621] IPVS: ftp: loaded support on port[0] = 21 [ 1873.578923][T23623] IPVS: ftp: loaded support on port[0] = 21 07:42:32 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:32 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:32 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xf000}, 0x0) [ 1873.892286][T23623] chnl_net:caif_netlink_parms(): no params data found [ 1873.917514][T23621] chnl_net:caif_netlink_parms(): no params data found [ 1874.013988][T23621] bridge0: port 1(bridge_slave_0) entered blocking state [ 1874.042518][T23621] bridge0: port 1(bridge_slave_0) entered disabled state [ 1874.050498][T23621] device bridge_slave_0 entered promiscuous mode [ 1874.073038][T23621] bridge0: port 2(bridge_slave_1) entered blocking state [ 1874.080206][T23621] bridge0: port 2(bridge_slave_1) entered disabled state [ 1874.088573][T23621] device bridge_slave_1 entered promiscuous mode [ 1874.116175][T23621] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1874.138764][T23621] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1874.156463][T23623] bridge0: port 1(bridge_slave_0) entered blocking state [ 1874.167881][T23623] bridge0: port 1(bridge_slave_0) entered disabled state [ 1874.179158][T23623] device bridge_slave_0 entered promiscuous mode [ 1874.197753][T23623] bridge0: port 2(bridge_slave_1) entered blocking state [ 1874.209541][T23623] bridge0: port 2(bridge_slave_1) entered disabled state [ 1874.220906][T23623] device bridge_slave_1 entered promiscuous mode [ 1874.237372][T23621] team0: Port device team_slave_0 added [ 1874.258591][T23621] team0: Port device team_slave_1 added [ 1874.297728][T23623] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1874.358382][T23621] device hsr_slave_0 entered promiscuous mode [ 1874.482853][T23621] device hsr_slave_1 entered promiscuous mode [ 1874.522604][T23621] debugfs: Directory 'hsr0' with parent '/' already present! [ 1874.531869][T23623] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1874.562256][T23621] bridge0: port 2(bridge_slave_1) entered blocking state [ 1874.569390][T23621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1874.576790][T23621] bridge0: port 1(bridge_slave_0) entered blocking state [ 1874.583882][T23621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1874.608154][T17571] bridge0: port 1(bridge_slave_0) entered disabled state [ 1874.623262][T17571] bridge0: port 2(bridge_slave_1) entered disabled state [ 1874.649132][T23623] team0: Port device team_slave_0 added [ 1874.668926][T23623] team0: Port device team_slave_1 added [ 1874.730088][T23621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1874.785097][T23623] device hsr_slave_0 entered promiscuous mode [ 1874.842984][T23623] device hsr_slave_1 entered promiscuous mode [ 1874.882505][T23623] debugfs: Directory 'hsr0' with parent '/' already present! [ 1874.899094][T23621] 8021q: adding VLAN 0 to HW filter on device team0 [ 1874.916550][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1874.930121][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1874.963803][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1874.977945][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1874.987281][T21134] bridge0: port 1(bridge_slave_0) entered blocking state [ 1874.994371][T21134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1875.003400][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1875.011865][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1875.020303][T21134] bridge0: port 2(bridge_slave_1) entered blocking state [ 1875.027345][T21134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1875.035725][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1875.044236][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1875.073718][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1875.082188][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1875.091224][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1875.100130][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1875.109535][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1875.118194][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1875.127322][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1875.146611][T23621] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1875.158343][T23621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1875.168927][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1875.178208][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1875.205829][T23621] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1875.216201][T23623] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1875.231407][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1875.240650][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1875.263439][T23623] 8021q: adding VLAN 0 to HW filter on device team0 [ 1875.274930][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1875.293064][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1875.301493][T21134] bridge0: port 1(bridge_slave_0) entered blocking state [ 1875.308590][T21134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1875.345469][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1875.354491][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1875.363651][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1875.372103][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 1875.379183][ T8780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1875.389270][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1875.399159][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1875.407865][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1875.416498][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1875.425827][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1875.441255][T23623] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1875.452154][T23623] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1875.465020][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1875.473318][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1875.481507][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1875.503569][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1875.514259][T23623] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1875.640543][T23641] bridge0: port 2(bridge_slave_1) entered disabled state [ 1875.653145][T23641] bridge0: port 1(bridge_slave_0) entered disabled state 07:42:34 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1876.419432][T23648] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 1876.434342][T23648] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1879.121622][T23648] bridge0: port 2(bridge_slave_1) entered disabled state [ 1879.128954][T23648] bridge0: port 1(bridge_slave_0) entered disabled state 07:42:41 executing program 4: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000001540)=0xfffffffffffffffd, 0x4) 07:42:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 07:42:41 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x0, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:41 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x34000}, 0x0) 07:42:41 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:41 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x400300}, 0x0) 07:42:41 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:41 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xf0ffff}, 0x0) 07:42:41 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:41 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x0, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1883.247160][T23651] IPVS: ftp: loaded support on port[0] = 21 07:42:41 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x0, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1883.965672][T23651] chnl_net:caif_netlink_parms(): no params data found [ 1884.100393][T23651] bridge0: port 1(bridge_slave_0) entered blocking state [ 1884.107601][T23651] bridge0: port 1(bridge_slave_0) entered disabled state [ 1884.115322][T23651] device bridge_slave_0 entered promiscuous mode [ 1884.124135][T23651] bridge0: port 2(bridge_slave_1) entered blocking state [ 1884.131267][T23651] bridge0: port 2(bridge_slave_1) entered disabled state [ 1884.139144][T23651] device bridge_slave_1 entered promiscuous mode [ 1884.236234][T23651] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1884.246781][T23651] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1884.340907][T23651] team0: Port device team_slave_0 added [ 1884.348545][T23651] team0: Port device team_slave_1 added [ 1884.395565][T23651] device hsr_slave_0 entered promiscuous mode [ 1884.452891][T23651] device hsr_slave_1 entered promiscuous mode [ 1884.492469][T23651] debugfs: Directory 'hsr0' with parent '/' already present! [ 1884.605478][T23651] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1884.690589][T23651] 8021q: adding VLAN 0 to HW filter on device team0 [ 1884.699232][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1884.707025][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1884.715875][T10647] device bridge_slave_1 left promiscuous mode [ 1884.722109][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1884.753789][T10647] device bridge_slave_0 left promiscuous mode [ 1884.759984][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1884.804551][T10647] device bridge_slave_1 left promiscuous mode [ 1884.810769][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1884.863194][T10647] device bridge_slave_0 left promiscuous mode [ 1884.869522][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1886.863201][T10647] device hsr_slave_0 left promiscuous mode [ 1886.902494][T10647] device hsr_slave_1 left promiscuous mode [ 1886.990013][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1887.004169][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1887.015316][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1887.099064][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1887.190875][T10647] bond0 (unregistering): Released all slaves [ 1887.463740][T10647] device hsr_slave_0 left promiscuous mode [ 1887.502551][T10647] device hsr_slave_1 left promiscuous mode [ 1887.553584][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1887.565694][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1887.576657][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1887.607764][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1887.679966][T10647] bond0 (unregistering): Released all slaves [ 1887.777091][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1887.786151][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1887.795009][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1887.802051][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1887.810985][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1887.819949][T23682] IPVS: ftp: loaded support on port[0] = 21 [ 1887.820152][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1887.835029][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 1887.842067][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1887.850187][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1887.858960][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1887.867992][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1887.889677][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1887.898742][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1887.908906][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1887.917605][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1887.929940][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1887.946975][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1887.956836][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1887.973933][T23651] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1887.986591][T23651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1887.999769][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1888.008571][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1888.028345][T23651] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1888.088561][T23682] chnl_net:caif_netlink_parms(): no params data found [ 1888.222075][T23682] bridge0: port 1(bridge_slave_0) entered blocking state [ 1888.236506][T23682] bridge0: port 1(bridge_slave_0) entered disabled state [ 1888.247634][T23682] device bridge_slave_0 entered promiscuous mode [ 1888.260127][T23682] bridge0: port 2(bridge_slave_1) entered blocking state [ 1888.271375][T23682] bridge0: port 2(bridge_slave_1) entered disabled state [ 1888.286529][T23682] device bridge_slave_1 entered promiscuous mode [ 1888.382033][T23682] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1888.395512][T23682] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1888.414212][T23690] bridge0: port 2(bridge_slave_1) entered disabled state [ 1888.422933][T23690] bridge0: port 1(bridge_slave_0) entered disabled state 07:42:47 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:47 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x1000000}, 0x0) 07:42:47 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:47 executing program 4: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x10048043, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000000)={0xfffffffffffffffb}, 0x0, 0x0, 0x8) acct(&(0x7f00000003c0)='./file0\x00') fcntl$setlease(r0, 0x400, 0x2) 07:42:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) [ 1889.205680][T23682] team0: Port device team_slave_0 added [ 1889.284208][T23682] team0: Port device team_slave_1 added [ 1889.395302][T23682] device hsr_slave_0 entered promiscuous mode [ 1889.452735][T23682] device hsr_slave_1 entered promiscuous mode [ 1889.492479][T23682] debugfs: Directory 'hsr0' with parent '/' already present! 07:42:48 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x2000000}, 0x0) 07:42:48 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:42:48 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x4000000}, 0x0) 07:42:48 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:48 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000ff"], 0x48}}, 0x0) [ 1890.270535][T23682] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1890.316284][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1890.327555][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1890.353427][T23682] 8021q: adding VLAN 0 to HW filter on device team0 07:42:48 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1890.369582][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1890.393182][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1890.401585][T21771] bridge0: port 1(bridge_slave_0) entered blocking state [ 1890.408703][T21771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1890.452945][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1890.466014][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1890.478543][T16975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1890.503208][T16975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1890.510349][T16975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1890.572754][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1890.599441][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1890.630951][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1890.668125][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1890.731537][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1890.765740][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1890.781539][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1890.807734][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1890.833074][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1890.851568][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1890.871780][T21134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1890.881086][T23682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1890.912687][T23682] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1891.204041][T23727] bridge0: port 2(bridge_slave_1) entered disabled state [ 1891.212933][T23727] bridge0: port 1(bridge_slave_0) entered disabled state [ 1891.850191][T23730] IPVS: ftp: loaded support on port[0] = 21 07:42:50 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:42:50 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xa000000}, 0x0) 07:42:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000ff"], 0x48}}, 0x0) 07:42:50 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1892.141471][T23730] chnl_net:caif_netlink_parms(): no params data found [ 1892.517125][T23744] IPVS: ftp: loaded support on port[0] = 21 [ 1892.533261][T23730] bridge0: port 1(bridge_slave_0) entered blocking state [ 1892.540317][T23730] bridge0: port 1(bridge_slave_0) entered disabled state [ 1892.548794][T23730] device bridge_slave_0 entered promiscuous mode [ 1892.558415][T23730] bridge0: port 2(bridge_slave_1) entered blocking state [ 1892.565560][T23730] bridge0: port 2(bridge_slave_1) entered disabled state [ 1892.573579][T23730] device bridge_slave_1 entered promiscuous mode [ 1892.622000][T23730] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1892.660918][T23730] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1892.689666][T23730] team0: Port device team_slave_0 added [ 1892.697934][T23730] team0: Port device team_slave_1 added [ 1892.784664][T23730] device hsr_slave_0 entered promiscuous mode [ 1892.853678][T23730] device hsr_slave_1 entered promiscuous mode [ 1892.912448][T23730] debugfs: Directory 'hsr0' with parent '/' already present! [ 1893.355341][T23744] chnl_net:caif_netlink_parms(): no params data found [ 1893.390626][T23744] bridge0: port 1(bridge_slave_0) entered blocking state [ 1893.397901][T23744] bridge0: port 1(bridge_slave_0) entered disabled state [ 1893.406193][T23744] device bridge_slave_0 entered promiscuous mode [ 1893.416199][T23744] bridge0: port 2(bridge_slave_1) entered blocking state [ 1893.423554][T23744] bridge0: port 2(bridge_slave_1) entered disabled state [ 1893.431101][T23744] device bridge_slave_1 entered promiscuous mode [ 1893.677053][T23744] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1893.688806][T23744] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1893.930434][T23744] team0: Port device team_slave_0 added [ 1893.941736][T23744] team0: Port device team_slave_1 added [ 1894.244364][T23744] device hsr_slave_0 entered promiscuous mode [ 1894.292881][T23744] device hsr_slave_1 entered promiscuous mode [ 1894.362853][T23744] debugfs: Directory 'hsr0' with parent '/' already present! [ 1894.610359][T23730] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1894.627455][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1894.636396][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1894.867471][T23730] 8021q: adding VLAN 0 to HW filter on device team0 [ 1894.878338][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1894.887066][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1894.896969][T20262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1894.904053][T20262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1894.912894][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1895.146994][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1895.156130][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1895.165070][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1895.172167][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1895.200113][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1895.214261][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1895.441674][T23744] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1895.459052][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1895.467829][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1895.476552][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1895.484388][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1895.499223][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1895.511518][T23744] 8021q: adding VLAN 0 to HW filter on device team0 [ 1895.528924][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1895.540116][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1895.548850][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1895.557543][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1895.566081][T15184] bridge0: port 1(bridge_slave_0) entered blocking state [ 1895.573172][T15184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1895.580817][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1895.589802][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1895.598459][T15184] bridge0: port 2(bridge_slave_1) entered blocking state [ 1895.605568][T15184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1895.613879][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1895.622152][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1895.631942][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1895.639997][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1895.872981][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1895.881505][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1895.897468][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1895.906096][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1895.915265][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1895.924982][T20998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1895.935274][T23730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1895.949606][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1895.958486][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1895.968839][T10647] device bridge_slave_1 left promiscuous mode [ 1895.975463][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1896.063543][T10647] device bridge_slave_0 left promiscuous mode [ 1896.069761][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1896.113715][T10647] device bridge_slave_1 left promiscuous mode [ 1896.119852][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1896.173597][T10647] device bridge_slave_0 left promiscuous mode [ 1896.179795][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1896.254436][T10647] device bridge_slave_1 left promiscuous mode [ 1896.260596][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1896.323641][T10647] device bridge_slave_0 left promiscuous mode [ 1896.329792][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1896.383759][T10647] device bridge_slave_1 left promiscuous mode [ 1896.389945][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1896.453527][T10647] device bridge_slave_0 left promiscuous mode [ 1896.459758][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1902.062976][T10647] device hsr_slave_0 left promiscuous mode [ 1902.102617][T10647] device hsr_slave_1 left promiscuous mode [ 1902.169992][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1902.185527][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1902.198897][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1902.238316][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1902.330715][T10647] bond0 (unregistering): Released all slaves [ 1902.493436][T10647] device hsr_slave_0 left promiscuous mode [ 1902.532924][T10647] device hsr_slave_1 left promiscuous mode [ 1902.585260][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1902.598526][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1902.609903][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1902.660760][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1902.730363][T10647] bond0 (unregistering): Released all slaves [ 1902.863400][T10647] device hsr_slave_0 left promiscuous mode [ 1902.902570][T10647] device hsr_slave_1 left promiscuous mode [ 1902.979933][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1902.994000][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1903.005275][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1903.050876][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1903.140271][T10647] bond0 (unregistering): Released all slaves [ 1903.313064][T10647] device hsr_slave_0 left promiscuous mode [ 1903.372500][T10647] device hsr_slave_1 left promiscuous mode [ 1903.435953][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1903.449160][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1903.461036][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1903.497498][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1903.579221][T10647] bond0 (unregistering): Released all slaves [ 1903.723083][T23730] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1903.749362][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1903.759762][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1903.777253][T23744] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1903.789293][T23744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1903.800020][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1903.815426][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1903.835804][T23744] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1904.045337][ T26] audit: type=1804 audit(1568014982.634:46): pid=23758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir351427631/syzkaller.6zE9rQ/0/file0" dev="sda1" ino=16678 res=1 [ 1904.049442][T23764] Process accounting resumed 07:43:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:02 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500007f"], 0x48}}, 0x0) 07:43:02 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xe000000}, 0x0) 07:43:02 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="34e7ff0000013500000076c085c6b62e0066658f00000500f76395ac922d657f12b579fb64a18c15eeb876aeb1cd06000000e20093750e"], 0xe) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 07:43:02 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1904.146245][T23763] bridge0: port 2(bridge_slave_1) entered disabled state [ 1904.155790][T23763] bridge0: port 1(bridge_slave_0) entered disabled state [ 1904.157536][T23760] Process accounting resumed 07:43:02 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xf000000}, 0x0) 07:43:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d500009e"], 0x48}}, 0x0) 07:43:03 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:03 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x40000000}, 0x0) 07:43:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000f0"], 0x48}}, 0x0) 07:43:03 executing program 4: r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0xfffffffffffffffa, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) shutdown(r0, 0x2) 07:43:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1906.696116][T23809] IPVS: ftp: loaded support on port[0] = 21 [ 1906.810612][T23809] chnl_net:caif_netlink_parms(): no params data found [ 1906.867113][T23809] bridge0: port 1(bridge_slave_0) entered blocking state [ 1906.878659][T23809] bridge0: port 1(bridge_slave_0) entered disabled state [ 1906.888925][T23809] device bridge_slave_0 entered promiscuous mode [ 1906.902829][T23809] bridge0: port 2(bridge_slave_1) entered blocking state [ 1906.909948][T23809] bridge0: port 2(bridge_slave_1) entered disabled state [ 1906.918269][T23809] device bridge_slave_1 entered promiscuous mode [ 1906.940907][T23809] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1906.953159][T23809] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1906.977145][T23809] team0: Port device team_slave_0 added [ 1906.985161][T23809] team0: Port device team_slave_1 added [ 1907.065329][T23809] device hsr_slave_0 entered promiscuous mode [ 1907.102713][T23809] device hsr_slave_1 entered promiscuous mode 07:43:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0xfffffeae}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) 07:43:05 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x60000000}, 0x0) 07:43:05 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d50000ff"], 0x48}}, 0x0) [ 1907.172405][T23809] debugfs: Directory 'hsr0' with parent '/' already present! [ 1907.266449][T23809] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1907.318221][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1907.329848][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1907.350934][T23809] 8021q: adding VLAN 0 to HW filter on device team0 [ 1907.374116][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1907.389534][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1907.398621][T15184] bridge0: port 1(bridge_slave_0) entered blocking state [ 1907.405771][T15184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1907.435038][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1907.453081][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1907.461788][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1907.477429][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1907.484584][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1907.502765][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1907.523256][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1907.546270][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1907.561062][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1907.579563][T23809] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1907.621457][T23809] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1907.668866][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1907.700098][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1907.709520][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1907.741917][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1907.757728][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1907.767354][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1907.780996][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1907.790384][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1907.818539][T23809] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1908.008763][T23839] bridge0: port 2(bridge_slave_1) entered disabled state [ 1908.019311][T23839] bridge0: port 1(bridge_slave_0) entered disabled state 07:43:07 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x0, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:07 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:07 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x9effffff}, 0x0) 07:43:07 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000400) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) 07:43:07 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xa5000000}, 0x0) 07:43:07 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x713e000000000000, 0x43400) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) getrusage(0x0, &(0x7f0000000300)) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:43:07 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xf0ffffff}, 0x0) 07:43:07 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:08 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1910.893421][T10647] device bridge_slave_1 left promiscuous mode [ 1910.899698][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1910.963377][T10647] device bridge_slave_0 left promiscuous mode [ 1910.969594][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1912.853404][T10647] device hsr_slave_0 left promiscuous mode [ 1912.922507][T10647] device hsr_slave_1 left promiscuous mode [ 1913.011791][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1913.025377][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1913.036061][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1913.087257][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1913.191911][T10647] bond0 (unregistering): Released all slaves [ 1913.311837][T23889] IPVS: ftp: loaded support on port[0] = 21 [ 1913.382055][T23889] chnl_net:caif_netlink_parms(): no params data found [ 1913.411304][T23889] bridge0: port 1(bridge_slave_0) entered blocking state [ 1913.418548][T23889] bridge0: port 1(bridge_slave_0) entered disabled state [ 1913.426533][T23889] device bridge_slave_0 entered promiscuous mode [ 1913.434723][T23889] bridge0: port 2(bridge_slave_1) entered blocking state [ 1913.441827][T23889] bridge0: port 2(bridge_slave_1) entered disabled state [ 1913.449520][T23889] device bridge_slave_1 entered promiscuous mode [ 1913.470554][T23889] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1913.481646][T23889] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1913.505197][T23889] team0: Port device team_slave_0 added [ 1913.511963][T23889] team0: Port device team_slave_1 added [ 1913.565801][T23889] device hsr_slave_0 entered promiscuous mode [ 1913.606046][T23889] device hsr_slave_1 entered promiscuous mode [ 1913.665683][T23889] debugfs: Directory 'hsr0' with parent '/' already present! [ 1913.744189][T23889] bridge0: port 2(bridge_slave_1) entered blocking state [ 1913.751294][T23889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1913.758727][T23889] bridge0: port 1(bridge_slave_0) entered blocking state [ 1913.765811][T23889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1913.841859][T23889] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1913.863842][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1913.879450][T15184] bridge0: port 1(bridge_slave_0) entered disabled state [ 1913.887419][T15184] bridge0: port 2(bridge_slave_1) entered disabled state [ 1913.910775][T23889] 8021q: adding VLAN 0 to HW filter on device team0 [ 1913.923510][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1913.931837][T15184] bridge0: port 1(bridge_slave_0) entered blocking state [ 1913.938931][T15184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1913.973815][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1913.989853][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1913.996937][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1914.013869][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1914.029318][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1914.047918][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1914.056159][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1914.065019][T15184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1914.076080][T23889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1914.114015][T23889] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1914.352882][T23898] bridge0: port 2(bridge_slave_1) entered disabled state [ 1914.362087][T23898] bridge0: port 1(bridge_slave_0) entered disabled state 07:43:13 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:13 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xfffff000}, 0x0) 07:43:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x713e000000000000, 0x43400) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) getrusage(0x0, &(0x7f0000000300)) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:43:13 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:14 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xffffff7f}, 0x0) 07:43:14 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:getty_exec_t:s0\x00', 0x22, 0x1) 07:43:14 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xffffff9e}, 0x0) 07:43:14 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:14 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000001b00)=[{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="d7", 0x1}], 0x1, &(0x7f0000000140)=[@op={0x18}], 0x18}], 0x1, 0x0) 07:43:14 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:14 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xfffffff0}, 0x0) 07:43:14 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1917.588164][T23961] IPVS: ftp: loaded support on port[0] = 21 [ 1917.787693][T23961] chnl_net:caif_netlink_parms(): no params data found [ 1917.951647][T23961] bridge0: port 1(bridge_slave_0) entered blocking state [ 1917.958869][T23961] bridge0: port 1(bridge_slave_0) entered disabled state [ 1917.966507][T23961] device bridge_slave_0 entered promiscuous mode [ 1918.107814][T23961] bridge0: port 2(bridge_slave_1) entered blocking state [ 1918.115001][T23961] bridge0: port 2(bridge_slave_1) entered disabled state [ 1918.122840][T23961] device bridge_slave_1 entered promiscuous mode [ 1918.274225][T23961] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1918.287078][T23961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1918.304617][T23961] team0: Port device team_slave_0 added [ 1918.311382][T23961] team0: Port device team_slave_1 added [ 1918.495045][T23961] device hsr_slave_0 entered promiscuous mode [ 1918.532754][T23961] device hsr_slave_1 entered promiscuous mode [ 1918.572659][T23961] debugfs: Directory 'hsr0' with parent '/' already present! [ 1918.718486][T23961] bridge0: port 2(bridge_slave_1) entered blocking state [ 1918.725567][T23961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1918.732916][T23961] bridge0: port 1(bridge_slave_0) entered blocking state [ 1918.739950][T23961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1918.765139][T10647] device bridge_slave_1 left promiscuous mode [ 1918.771311][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1918.813668][T10647] device bridge_slave_0 left promiscuous mode [ 1918.819815][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1918.883739][T10647] device bridge_slave_1 left promiscuous mode [ 1918.889933][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1918.934091][T10647] device bridge_slave_0 left promiscuous mode [ 1918.940274][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1922.483002][T10647] device hsr_slave_0 left promiscuous mode [ 1922.532739][T10647] device hsr_slave_1 left promiscuous mode [ 1922.589896][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1922.603669][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1922.615194][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1922.666372][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1922.748779][T10647] bond0 (unregistering): Released all slaves [ 1922.943304][T10647] device hsr_slave_0 left promiscuous mode [ 1922.992653][T10647] device hsr_slave_1 left promiscuous mode [ 1923.044146][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1923.056904][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1923.067425][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1923.129912][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1923.219128][T10647] bond0 (unregistering): Released all slaves [ 1923.335960][T21771] bridge0: port 1(bridge_slave_0) entered disabled state [ 1923.343999][T21771] bridge0: port 2(bridge_slave_1) entered disabled state [ 1923.367195][T23961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1923.379176][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1923.387419][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1923.398031][T23961] 8021q: adding VLAN 0 to HW filter on device team0 [ 1923.407888][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1923.417477][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1923.426009][T21771] bridge0: port 1(bridge_slave_0) entered blocking state [ 1923.433117][T21771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1923.444252][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1923.455127][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1923.466005][T20262] bridge0: port 2(bridge_slave_1) entered blocking state [ 1923.473094][T20262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1923.492523][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1923.501136][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1923.509649][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1923.518228][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1923.527027][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1923.535587][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1923.544250][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1923.552533][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1923.563430][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1923.579924][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1923.588394][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1923.598458][T23961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1923.717037][T23961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1923.911796][T23969] bridge0: port 2(bridge_slave_1) entered disabled state [ 1923.920935][T23969] bridge0: port 1(bridge_slave_0) entered disabled state 07:43:23 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001b00)=[{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="d7606d92e0a5e3356b478f19649abfc6abde819a5e6ea3d8d66603bf2b81424cac282495643a4431d976df7cc094160ca24fb0017a08653362f412c88ad967ab61c9d488ea950766c047367db03a6db66dc6e7b37e90b364ed06598f88a1ffaa1f0f180da4514686e6607f028b5a08bb2759908932106ded5b182aa626c5cd62eca8d9aa41c016fdab268288bb9669a1016883d9ce7288927475b884865d3a560591321f41fac5844650ccd207eb2294663662dfbd8047d7695ba1cbcdb4946e1d507629d3ff86b3c3b8a94a4b429249d3785e", 0xd3}, {&(0x7f00000002c0)="600b46ad37ae88f0b70b66ebf6be9fe75500e37d0932a404073f4e09206dc45bc731009f126476273913973f84971b9c7e46a4b488f2307f4e77be9372", 0x3d}], 0x2, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) r2 = dup(r1) read$FUSE(r2, &(0x7f0000002480), 0x2314432e) 07:43:23 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:23 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x40030000000000}, 0x0) 07:43:23 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mq_open(0x0, 0x0, 0x0, &(0x7f0000000080)={0x6}) ppoll(&(0x7f0000000040), 0x2000000000000041, 0x0, 0x0, 0x0) 07:43:23 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xf0ffffffffffff}, 0x0) 07:43:23 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() dup(r0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:24 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x100000000000000}, 0x0) 07:43:24 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:24 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x4004551e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) 07:43:24 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) [ 1927.025629][T24020] IPVS: ftp: loaded support on port[0] = 21 [ 1927.150671][T24020] chnl_net:caif_netlink_parms(): no params data found [ 1927.241333][T24020] bridge0: port 1(bridge_slave_0) entered blocking state [ 1927.248608][T24020] bridge0: port 1(bridge_slave_0) entered disabled state [ 1927.256164][T24020] device bridge_slave_0 entered promiscuous mode [ 1927.326465][T24020] bridge0: port 2(bridge_slave_1) entered blocking state [ 1927.333700][T24020] bridge0: port 2(bridge_slave_1) entered disabled state [ 1927.341286][T24020] device bridge_slave_1 entered promiscuous mode [ 1927.357832][T24020] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1927.368838][T24020] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1927.453735][T24020] team0: Port device team_slave_0 added [ 1927.460314][T24020] team0: Port device team_slave_1 added [ 1927.505335][T24020] device hsr_slave_0 entered promiscuous mode [ 1927.542862][T24020] device hsr_slave_1 entered promiscuous mode [ 1927.612460][T24020] debugfs: Directory 'hsr0' with parent '/' already present! [ 1927.691426][T24020] bridge0: port 2(bridge_slave_1) entered blocking state [ 1927.698579][T24020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1927.705962][T24020] bridge0: port 1(bridge_slave_0) entered blocking state [ 1927.713081][T24020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1927.810294][T24020] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1927.824836][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1927.834010][T21771] bridge0: port 1(bridge_slave_0) entered disabled state [ 1927.841543][T21771] bridge0: port 2(bridge_slave_1) entered disabled state [ 1927.850360][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1927.926020][T24020] 8021q: adding VLAN 0 to HW filter on device team0 [ 1927.937569][ T8762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1927.946374][ T8762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1927.953462][ T8762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1928.029049][T21771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1928.038391][T21771] bridge0: port 2(bridge_slave_1) entered blocking state [ 1928.045487][T21771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1928.064380][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1928.073420][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1928.081773][T20262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1928.092586][T10647] device bridge_slave_1 left promiscuous mode [ 1928.098750][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1928.153388][T10647] device bridge_slave_0 left promiscuous mode [ 1928.159592][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1929.902983][T10647] device hsr_slave_0 left promiscuous mode [ 1929.942518][T10647] device hsr_slave_1 left promiscuous mode [ 1929.992056][T10647] team0 (unregistering): Port device team_slave_1 removed [ 1930.005541][T10647] team0 (unregistering): Port device team_slave_0 removed [ 1930.015943][T10647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1930.057366][T10647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1930.129736][T10647] bond0 (unregistering): Released all slaves [ 1930.227314][T17571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1930.240119][T24020] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1930.251314][T24020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1930.263003][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1930.271232][ T8739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1930.298293][T24020] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1930.489257][T24028] bridge0: port 2(bridge_slave_1) entered disabled state [ 1930.498417][T24028] bridge0: port 1(bridge_slave_0) entered disabled state 07:43:29 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:29 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x200000000000000}, 0x0) 07:43:29 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket(0x10, 0x200000000803, 0x0) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x1, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x8000, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:29 executing program 4: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [], {0x4, 0xa742b8b49ac0e9f9}}, 0x24, 0x0) 07:43:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() dup(r0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:29 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x3, 0x0, &(0x7f0000000240)=0x0) timer_settime(r1, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{}, {0x0, 0x1c9c380}}, &(0x7f00000003c0)) timer_create(0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000280), 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) stat(0x0, &(0x7f0000000600)) socket$inet6(0xa, 0x0, 0x10000) r3 = getgid() setregid(0x0, r3) getgid() ioctl$TIOCSIG(r0, 0x40045436, 0x24) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) r4 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$BLKRESETZONE(r4, 0x40101283, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000000200)="c7f8bd6de711d2fe6223e279a118aeae2d233c3f8bd354db86fd3c939f99660588361a40720915d494f87c174e179061ab7a412ebbc0205f49032b0e618398203322fda4a92fa5e7a3b63fc87501dabdaecc1426d6bc6e199b9e", 0x5a, r4}, 0x68) r5 = getgid() setregid(0x0, r5) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="40f2bb00000000000b001b000000"], 0x30}}, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 07:43:30 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() dup(r0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) 07:43:30 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0x400000000000000}, 0x0) [ 1932.296331][T24043] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 1932.312618][T24043] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 07:43:31 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 07:43:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000de8c37874a00000000000000000000000000000900000003000000c00200000000000060110000601100006011000060110000801200008012000080120000801200", @ANYBLOB="121860a5"], 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2000) [ 1934.561638][T24043] bridge0: port 2(bridge_slave_1) entered disabled state [ 1934.569081][T24043] bridge0: port 1(bridge_slave_0) entered disabled state 07:43:36 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)}], 0x1) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0, 0x0, 0x0, 0x9}}], 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0x10, "6aa0d8a3430df333d742644b21576793"}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}, 0x0, 0x10000, 0x100000001, 0x18b, 0x82}, 0x98) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0xfffffffffffffffa) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x450be, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 07:43:36 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400070000000000000000000aff0006667e279639a91d7b7f0000017d6e48317bcedf6181da9e3f088b891baf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}, 0x1, 0xa00000000000000}, 0x0) [ 1937.808075][T24044] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 1937.832764][T24044] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1937.867357][T24072] IPVS: ftp: loaded support on port[0] = 21 [ 1937.873670][T24044] ------------[ cut here ]------------ [ 1937.879389][T24044] WARNING: CPU: 0 PID: 24044 at kernel/time/posix-cpu-timers.c:401 posix_cpu_timer_del+0x2f0/0x3b0 [ 1937.890044][T24044] Kernel panic - not syncing: panic_on_warn set ... [ 1937.896630][T24044] CPU: 0 PID: 24044 Comm: syz-executor.4 Not tainted 5.3.0-rc6-next-20190830 #75 [ 1937.905725][T24044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1937.915771][T24044] Call Trace: [ 1937.919056][T24044] dump_stack+0x172/0x1f0 [ 1937.923382][T24044] ? posix_cpu_timer_del+0x2e0/0x3b0 [ 1937.928660][T24044] panic+0x2dc/0x755 [ 1937.932550][T24044] ? add_taint.cold+0x16/0x16 [ 1937.937224][T24044] ? printk+0xba/0xed [ 1937.941200][T24044] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1937.946655][T24044] ? __warn.cold+0x14/0x3c [ 1937.951063][T24044] ? __warn+0xd9/0x1d0 [ 1937.955117][T24044] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 1937.960381][T24044] __warn.cold+0x2f/0x3c [ 1937.964616][T24044] ? report_bug.cold+0x63/0xad [ 1937.969369][T24044] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 1937.974635][T24044] report_bug+0x289/0x300 [ 1937.978950][T24044] do_error_trap+0x11b/0x200 [ 1937.983527][T24044] do_invalid_op+0x37/0x50 [ 1937.987942][T24044] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 1937.993209][T24044] invalid_op+0x23/0x30 [ 1937.997356][T24044] RIP: 0010:posix_cpu_timer_del+0x2f0/0x3b0 [ 1938.003229][T24044] Code: 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 83 bb c8 00 00 00 00 74 16 e8 00 58 0d 00 <0f> 0b e9 87 fe ff ff e8 c4 38 48 00 e9 dd fd ff ff e8 ea 57 0d 00 [ 1938.022811][T24044] RSP: 0018:ffff88805ae57a30 EFLAGS: 00010093 [ 1938.028855][T24044] RAX: ffff8880997f2200 RBX: ffff88809895aa10 RCX: 1ffff110132fe552 [ 1938.036821][T24044] RDX: 0000000000000000 RSI: ffffffff8164fe10 RDI: ffff88809895aad8 [ 1938.044774][T24044] RBP: ffff88805ae57ac0 R08: 0000000000000002 R09: ffff8880997f2a98 [ 1938.052727][T24044] R10: fffffbfff138aef8 R11: ffffffff89c577c7 R12: ffff88809529c1c0 [ 1938.060690][T24044] R13: 1ffff1100b5caf47 R14: ffff88805ae57a98 R15: ffff88809895aa68 [ 1938.068666][T24044] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 1938.073932][T24044] ? lock_acquire+0x190/0x410 [ 1938.078590][T24044] ? thread_cpu_clock_getres+0x90/0x90 [ 1938.084032][T24044] ? thread_cpu_clock_getres+0x90/0x90 [ 1938.089470][T24044] exit_itimers+0xdb/0x2e0 [ 1938.093871][T24044] do_exit+0x1980/0x2e60 [ 1938.098092][T24044] ? get_signal+0x392/0x2500 [ 1938.102663][T24044] ? find_held_lock+0x35/0x130 [ 1938.107407][T24044] ? get_signal+0x392/0x2500 [ 1938.111995][T24044] ? mm_update_next_owner+0x640/0x640 [ 1938.117437][T24044] ? lock_downgrade+0x920/0x920 [ 1938.122270][T24044] ? _raw_spin_unlock_irq+0x28/0x90 [ 1938.127447][T24044] ? get_signal+0x392/0x2500 [ 1938.132028][T24044] ? _raw_spin_unlock_irq+0x28/0x90 [ 1938.137220][T24044] do_group_exit+0x135/0x360 [ 1938.141799][T24044] get_signal+0x47c/0x2500 [ 1938.146195][T24044] ? ksys_dup3+0x3e0/0x3e0 [ 1938.150612][T24044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1938.156834][T24044] ? debug_smp_processor_id+0x3c/0x214 [ 1938.162278][T24044] do_signal+0x87/0x1700 [ 1938.166501][T24044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1938.172813][T24044] ? fput_many+0x12c/0x1a0 [ 1938.177206][T24044] ? fput+0x1b/0x20 [ 1938.180995][T24044] ? setup_sigcontext+0x7d0/0x7d0 [ 1938.185999][T24044] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1938.191010][T24044] ? exit_to_usermode_loop+0x43/0x380 [ 1938.196359][T24044] ? do_syscall_64+0x65f/0x760 [ 1938.201102][T24044] ? exit_to_usermode_loop+0x43/0x380 [ 1938.206458][T24044] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1938.211725][T24044] ? trace_hardirqs_on+0x67/0x240 [ 1938.216734][T24044] exit_to_usermode_loop+0x286/0x380 [ 1938.222004][T24044] do_syscall_64+0x65f/0x760 [ 1938.226580][T24044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1938.232452][T24044] RIP: 0033:0x4598e9 [ 1938.236342][T24044] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1938.255922][T24044] RSP: 002b:00007f149497ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1938.264311][T24044] RAX: 0000000000000030 RBX: 0000000000000003 RCX: 00000000004598e9 [ 1938.272265][T24044] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000005 [ 1938.280214][T24044] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1938.288177][T24044] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f149497f6d4 [ 1938.296130][T24044] R13: 00000000004c77ea R14: 00000000004dd080 R15: 00000000ffffffff [ 1938.305574][T24044] Kernel Offset: disabled [ 1938.310065][T24044] Rebooting in 86400 seconds..