nux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2608.740857] IPVS: ftp: loaded support on port[0] = 21 [ 2609.593314] IPVS: ftp: loaded support on port[0] = 21 [ 2609.639616] chnl_net:caif_netlink_parms(): no params data found [ 2609.704990] IPVS: ftp: loaded support on port[0] = 21 [ 2609.712493] bridge0: port 1(bridge_slave_0) entered blocking state [ 2609.718876] bridge0: port 1(bridge_slave_0) entered disabled state [ 2609.725910] device bridge_slave_0 entered promiscuous mode [ 2609.732651] bridge0: port 2(bridge_slave_1) entered blocking state [ 2609.739042] bridge0: port 2(bridge_slave_1) entered disabled state [ 2609.746018] device bridge_slave_1 entered promiscuous mode [ 2609.770222] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2609.780189] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2609.814416] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2609.821587] team0: Port device team_slave_0 added [ 2609.828867] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2609.836170] team0: Port device team_slave_1 added [ 2609.873493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2609.883505] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2609.909894] chnl_net:caif_netlink_parms(): no params data found [ 2609.972396] device hsr_slave_0 entered promiscuous mode [ 2610.020520] device hsr_slave_1 entered promiscuous mode [ 2610.093368] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2610.126634] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2610.143951] IPVS: ftp: loaded support on port[0] = 21 [ 2610.194509] bridge0: port 1(bridge_slave_0) entered blocking state [ 2610.201793] bridge0: port 1(bridge_slave_0) entered disabled state [ 2610.209211] device bridge_slave_0 entered promiscuous mode [ 2610.218376] bridge0: port 2(bridge_slave_1) entered blocking state [ 2610.225263] bridge0: port 2(bridge_slave_1) entered disabled state [ 2610.232554] device bridge_slave_1 entered promiscuous mode [ 2610.245453] chnl_net:caif_netlink_parms(): no params data found [ 2610.274765] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2610.291471] bridge0: port 2(bridge_slave_1) entered blocking state [ 2610.297821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2610.304457] bridge0: port 1(bridge_slave_0) entered blocking state [ 2610.310830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2610.328888] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2610.376190] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2610.383485] team0: Port device team_slave_0 added [ 2610.401789] IPVS: ftp: loaded support on port[0] = 21 [ 2610.402106] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2610.414504] team0: Port device team_slave_1 added [ 2610.429453] bridge0: port 1(bridge_slave_0) entered blocking state [ 2610.435892] bridge0: port 1(bridge_slave_0) entered disabled state [ 2610.443516] device bridge_slave_0 entered promiscuous mode [ 2610.457965] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2610.468172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2610.481149] bridge0: port 2(bridge_slave_1) entered blocking state [ 2610.487484] bridge0: port 2(bridge_slave_1) entered disabled state [ 2610.495291] device bridge_slave_1 entered promiscuous mode [ 2610.562677] device hsr_slave_0 entered promiscuous mode [ 2610.600492] device hsr_slave_1 entered promiscuous mode [ 2610.643343] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2610.691849] bridge0: port 1(bridge_slave_0) entered disabled state [ 2610.698575] bridge0: port 2(bridge_slave_1) entered disabled state [ 2610.715734] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2610.733097] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2610.743458] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2610.770144] chnl_net:caif_netlink_parms(): no params data found [ 2610.793082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2610.813105] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2610.821160] team0: Port device team_slave_0 added [ 2610.827484] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2610.839984] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2610.846836] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2610.854770] team0: Port device team_slave_1 added [ 2610.889771] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2610.897439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2610.906269] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2610.926678] bridge0: port 1(bridge_slave_0) entered blocking state [ 2610.933224] bridge0: port 1(bridge_slave_0) entered disabled state [ 2610.940846] device bridge_slave_0 entered promiscuous mode [ 2610.954413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2610.967157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2610.975794] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2610.987520] 8021q: adding VLAN 0 to HW filter on device team0 [ 2611.027181] bridge0: port 2(bridge_slave_1) entered blocking state [ 2611.033723] bridge0: port 2(bridge_slave_1) entered disabled state [ 2611.041097] device bridge_slave_1 entered promiscuous mode [ 2611.102815] device hsr_slave_0 entered promiscuous mode [ 2611.140356] device hsr_slave_1 entered promiscuous mode [ 2611.191659] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2611.224888] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2611.237343] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2611.248155] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2611.264601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2611.290165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2611.297827] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2611.305857] bridge0: port 1(bridge_slave_0) entered blocking state [ 2611.312213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2611.321826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2611.330923] chnl_net:caif_netlink_parms(): no params data found [ 2611.340926] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2611.347496] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2611.354836] team0: Port device team_slave_0 added [ 2611.364087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2611.371994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2611.379460] bridge0: port 2(bridge_slave_1) entered blocking state [ 2611.385817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2611.393999] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2611.417877] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2611.424980] team0: Port device team_slave_1 added [ 2611.431378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2611.439200] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2611.448739] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2611.459473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2611.483075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2611.502450] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2611.523587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2611.531286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2611.538769] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2611.554903] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2611.562880] bridge0: port 1(bridge_slave_0) entered blocking state [ 2611.569218] bridge0: port 1(bridge_slave_0) entered disabled state [ 2611.576923] device bridge_slave_0 entered promiscuous mode [ 2611.585892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2611.592796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2611.600824] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2611.610643] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2611.619790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2611.662523] device hsr_slave_0 entered promiscuous mode [ 2611.710379] device hsr_slave_1 entered promiscuous mode [ 2611.750367] bridge0: port 2(bridge_slave_1) entered blocking state [ 2611.756741] bridge0: port 2(bridge_slave_1) entered disabled state [ 2611.763779] device bridge_slave_1 entered promiscuous mode [ 2611.789110] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2611.799327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2611.805556] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2611.812577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2611.819929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2611.827617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2611.835177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2611.843163] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2611.851303] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2611.857294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2611.865816] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2611.875808] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2611.886117] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2611.895968] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2611.904344] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2611.923794] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2611.930880] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2611.945703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2611.956972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2611.964152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2611.971610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2611.979244] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2611.987203] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2612.001272] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2612.007333] 8021q: adding VLAN 0 to HW filter on device team0 [ 2612.018646] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2612.025199] 8021q: adding VLAN 0 to HW filter on device team0 [ 2612.035047] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2612.041987] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2612.049185] team0: Port device team_slave_0 added [ 2612.055275] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2612.062581] team0: Port device team_slave_1 added [ 2612.067842] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2612.078725] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2612.093873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2612.110940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2612.119566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2612.127538] bridge0: port 1(bridge_slave_0) entered blocking state [ 2612.133884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2612.142456] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2612.152085] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2612.167194] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2612.180964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2612.188599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2612.196315] bridge0: port 1(bridge_slave_0) entered blocking state [ 2612.202691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2612.209440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2612.217357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2612.225082] bridge0: port 2(bridge_slave_1) entered blocking state [ 2612.231458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2612.292576] device hsr_slave_0 entered promiscuous mode [ 2612.330300] device hsr_slave_1 entered promiscuous mode [ 2612.370642] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2612.377574] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2612.389216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2612.400168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2612.407342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2612.425733] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2612.434298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2612.444073] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2612.457697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2612.466287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2612.474371] bridge0: port 2(bridge_slave_1) entered blocking state [ 2612.480749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2612.487506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2612.498005] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2612.514975] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2612.522194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2612.529839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2612.538710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2612.557435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2612.569329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2612.587473] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2612.603978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2612.625219] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2612.634056] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2612.757529] bridge0: port 2(bridge_slave_1) entered disabled state [ 2612.765498] bridge0: port 1(bridge_slave_0) entered disabled state 04:03:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b15add45f9a10000e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f51b106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e582e82ba8088fa881e689f7615baf78f0859fc000060d6a0b61193d4a1cb622431d4521124d46dab2fee5e91531bfdee5cb19ff15d91dd1a92efa823a3c2318a9389e2e99beb0188d49a53ae4fe7fcf509bf50600a2434369fa668b046005fc1e41eccbab4c0e594193f4e3f4bac9a87c676ed9f6ddf8f72b630521b90915f", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 2612.988585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2613.003833] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2613.014231] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2613.022038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2613.030739] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2613.039373] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2613.049067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2613.056117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2613.063026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2613.071035] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2613.078595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2613.086448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2613.093920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2613.101310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2613.115844] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2613.122381] 8021q: adding VLAN 0 to HW filter on device team0 [ 2613.130886] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2613.136897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2613.144324] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2613.153342] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2613.163932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2613.172365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2613.186285] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2613.193637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2613.202339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2613.209889] bridge0: port 1(bridge_slave_0) entered blocking state [ 2613.216248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2613.223259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2613.232276] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2613.246267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2613.258777] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2613.266458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2613.275123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2613.283088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2613.295993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2613.304962] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2613.314869] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2613.326958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2613.336010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2613.343980] bridge0: port 2(bridge_slave_1) entered blocking state [ 2613.350357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2613.357172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2613.365641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2613.374863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2613.384220] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2613.390522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2613.397958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2613.407136] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2613.415621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2613.425008] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2613.432434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2613.439683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2613.446956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2613.454932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2613.462813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2613.472518] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2613.478580] 8021q: adding VLAN 0 to HW filter on device team0 [ 2613.490515] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2613.498428] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2613.505721] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2613.512875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2613.521031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2613.530822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2613.539261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2613.553042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2613.568343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2613.577535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2613.585793] bridge0: port 1(bridge_slave_0) entered blocking state [ 2613.592179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2613.599192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2613.607626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2613.615404] bridge0: port 2(bridge_slave_1) entered blocking state [ 2613.621790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2613.629529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2613.655766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2613.672798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2613.686136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2613.697405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2613.705150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2613.714806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2613.723366] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2613.740539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2613.747946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2613.760788] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2613.766817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2613.775585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2613.796242] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2613.802731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2613.813061] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2613.829210] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2613.836241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2613.845145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2613.853871] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2613.871020] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2613.880451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2613.898252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2613.912800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2613.925559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2614.138019] bridge0: port 2(bridge_slave_1) entered disabled state [ 2614.147037] bridge0: port 1(bridge_slave_0) entered disabled state 04:03:56 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2614.401485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2614.416545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2614.426001] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2614.440930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2614.451118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2614.460817] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2614.466825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2614.487943] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2614.501416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2614.902312] bridge0: port 2(bridge_slave_1) entered disabled state [ 2614.910431] bridge0: port 1(bridge_slave_0) entered disabled state 04:03:57 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:03:57 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:03:57 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000440)=""/49, 0x2ff}, {&(0x7f0000000180)=""/116, 0x78}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000000580)=""/4080, 0x1000}], 0x4, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:03:57 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2615.415505] bridge0: port 2(bridge_slave_1) entered disabled state [ 2615.424356] bridge0: port 1(bridge_slave_0) entered disabled state 04:03:58 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2615.889387] bridge0: port 2(bridge_slave_1) entered disabled state [ 2615.898658] bridge0: port 1(bridge_slave_0) entered disabled state 04:03:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000640)="6653070000003639405cb4aed14e0000000000ae475ae64f8f36460234432479aed75d492b41fd983f91f828b15add45f9a10000e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f51b106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e582e82ba8088fa881e689f7615baf78f0859fc000060d6a0b61193d4a1cb622431d4521124d46dab2fee5e91531bfdee5cb19ff15d91dd1a92efa823a3c2318a9389e2e99beb0188d49a53ae4fe7fcf509bf50600a2434369fa668b046005fc1e41eccbab4c0e594193f4e3f4bac9a87c676ed9f6ddf8f72b630521b90915f", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x32) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 04:03:58 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:03:58 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:03:58 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{0xf, 0x1}, 0xaa, 0x1000, 0x11, 0x4, &(0x7f0000000040)="31e363f4f473179d1d39987072168dc0ea"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) r2 = socket$inet(0xa, 0x801, 0x84) connect$inet(r2, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r2, 0x83) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000040)={r5, 0x3d4, "920754bfab358bcc2c5fcc56f45c8f69bb35efe35109e525e5898bde82cf15442b80555a834969e7c2b03aaa6a8a291f94351116b59b675ddaea70fe73b53cb79ef2e7caf59d4c3420cabfc26f24452f7df08f2c24962c3e08af90dcf26ecf19a9df1244e940d369b831ac2391db5bc2a804872d5325b8aac5ca4c36f916f0c7ea8ca150c1e501e069c08a3f265a728f5174f65f07831a0eda3a94a5ff0ed917e50c9ff3fe6363377520689f7ec8fc79b93e6957c5fcabf3100abc4d0d46323d7a7366de52a02c2acbb44b87143496cdb2548368c9d435dfebea5506c8ddc6c0fed0f37909310a1aee55553187ed635bc7942ae1d7ea06a5abab9b90ee896e80f473d7103f595bee2d892f5ff6a061ff5c1c4f3c8323a2a4df0ab45661a4673394b6c000ce643d25cf976296bfc7084f90e20e804f4210614500c5db19bc731a826ec7a600fb83371c8f7970c8aee74f7b4ea3181fe66ea95afbeffb816e0817c3c0f4a0fdc8ffe2f864f88339f21ee3d7a92282912c1ae4a1dceaefb128658c68254cda85cb50c8a96b619e8548513a94bdd7cda42754d727535141cc97e6710ebc50a3449626f8c498714b247c0fb3091fc011249d62d4d5d722e81195aacc73a316eb64d4e3a30b5ff1c5ae7fafa678edd22eef0f41fb10f136a76fc24b7a1b953fa8a6826918a8943ff33edbf931a13d60eb972b2c0b63f9307b1e607712b5891277cf5efd5adaa32e63641a5aa213aad38a6861f1c6a6df6de3bb51c5e664ace2cf3a6b95f771b047d7435a2f5d9d770a946b221379e8a4a52dcfaa2c8c68d8ef6b73900adc0f7ec95c89158c6bfc306b08dbb8cfebbeb3552b0ca31e7957cf0d4e4daab29a092652e45811d7c34cb3a445aae3ede46b84437a524f374a632d04a6ccfa14dd95dc865479da48f9c2793c0275ed282ab21a6ad453c1ffef2c7c88cd6bf15b75a2e615c16611c664629ee8743a70d52fa7557564baf396b8921c63aa52f7061b0581fbb4c36d5853d0fad16a111c7ea96e5796eadb9f469a32193d9414f0f0aabb9a305d01e1519cee11f5472bc19044523c393e0117f2de3d40305f4efb63a22ccc99af431bd930501fe1d8747b510e6496f03ca99758d4157988252b958cbc7af1668218511e783ae715aca46f4a80e1c6b60fb50a1a2e2d91f014c6763c01cf3dd52d1a3306f32192bac7557936b587aa0eb8e6f89681ded341ab6236a6fd75ed124ccc6ea27b96a60c9172ef4f92a5bd7cb389bf456b7a0db473aae808bd7bce1b02425b9fc82d72ad54e8dd5b5add5bb7a011edf4ca6889203cfef92545ba2c8b32833b117a3ecf94a7b3d99ab57091e1962f6e288a24563fe53c3953cd94a0d8ae56d8d66d62b59ef5"}, &(0x7f0000001080)=0x3dc) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x1, 0x200, 0x1, 0x8, r5}, &(0x7f0000000380)=0x10) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0xfffffecf, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x4000) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) rmdir(&(0x7f0000000440)='./file0\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:03:58 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:03:58 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000000c46f0006000000070000003c9f0300000000000000c27ed0aa0c6a4f6fe1e81f00020000000000000067681bfd7a2ce29ae245e02de48afb4c2c9d1896ce7340feb1089dcbf61fc2"], 0x305) [ 2616.920584] device bridge_slave_1 left promiscuous mode [ 2616.926106] bridge0: port 2(bridge_slave_1) entered disabled state [ 2616.980847] device bridge_slave_0 left promiscuous mode [ 2616.987562] bridge0: port 1(bridge_slave_0) entered disabled state [ 2617.065402] device bridge_slave_1 left promiscuous mode [ 2617.084129] bridge0: port 2(bridge_slave_1) entered disabled state [ 2617.142921] device bridge_slave_0 left promiscuous mode [ 2617.148576] bridge0: port 1(bridge_slave_0) entered disabled state [ 2617.211239] device bridge_slave_1 left promiscuous mode [ 2617.216703] bridge0: port 2(bridge_slave_1) entered disabled state [ 2617.270800] device bridge_slave_0 left promiscuous mode [ 2617.276299] bridge0: port 1(bridge_slave_0) entered disabled state [ 2617.331254] device bridge_slave_1 left promiscuous mode [ 2617.336710] bridge0: port 2(bridge_slave_1) entered disabled state [ 2617.390719] device bridge_slave_0 left promiscuous mode [ 2617.396182] bridge0: port 1(bridge_slave_0) entered disabled state [ 2617.451107] device bridge_slave_1 left promiscuous mode [ 2617.456601] bridge0: port 2(bridge_slave_1) entered disabled state [ 2617.520886] device bridge_slave_0 left promiscuous mode [ 2617.526374] bridge0: port 1(bridge_slave_0) entered disabled state [ 2617.583335] bond1 (unregistering): Released all slaves [ 2617.652390] device hsr_slave_1 left promiscuous mode [ 2617.695551] device hsr_slave_0 left promiscuous mode [ 2617.753531] team0 (unregistering): Port device team_slave_1 removed [ 2617.766534] team0 (unregistering): Port device team_slave_0 removed [ 2617.778104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2617.824234] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2617.892259] bond0 (unregistering): Released all slaves [ 2618.002557] device hsr_slave_1 left promiscuous mode [ 2618.074405] device hsr_slave_0 left promiscuous mode [ 2618.103906] team0 (unregistering): Port device team_slave_1 removed [ 2618.113173] team0 (unregistering): Port device team_slave_0 removed [ 2618.131206] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2618.156198] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2618.233619] bond0 (unregistering): Released all slaves [ 2618.331731] device hsr_slave_1 left promiscuous mode [ 2618.393163] device hsr_slave_0 left promiscuous mode [ 2618.434314] team0 (unregistering): Port device team_slave_1 removed [ 2618.443654] team0 (unregistering): Port device team_slave_0 removed [ 2618.453111] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2618.493238] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2618.553372] bond0 (unregistering): Released all slaves [ 2618.681811] device hsr_slave_1 left promiscuous mode [ 2618.722472] device hsr_slave_0 left promiscuous mode [ 2618.792915] team0 (unregistering): Port device team_slave_1 removed [ 2618.803161] team0 (unregistering): Port device team_slave_0 removed [ 2618.812995] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2618.884267] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2618.965117] bond0 (unregistering): Released all slaves 04:04:01 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2619.063094] device hsr_slave_1 left promiscuous mode [ 2619.114026] device hsr_slave_0 left promiscuous mode [ 2619.162858] team0 (unregistering): Port device team_slave_1 removed [ 2619.172684] team0 (unregistering): Port device team_slave_0 removed [ 2619.183265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2619.254750] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2619.323214] bond0 (unregistering): Released all slaves [ 2619.499436] bridge0: port 2(bridge_slave_1) entered disabled state [ 2619.506984] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:02 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2624.400846] IPVS: ftp: loaded support on port[0] = 21 [ 2625.193823] IPVS: ftp: loaded support on port[0] = 21 [ 2625.264019] chnl_net:caif_netlink_parms(): no params data found [ 2625.317153] IPVS: ftp: loaded support on port[0] = 21 [ 2625.317266] bridge0: port 1(bridge_slave_0) entered blocking state [ 2625.329067] bridge0: port 1(bridge_slave_0) entered disabled state [ 2625.340781] device bridge_slave_0 entered promiscuous mode [ 2625.354478] bridge0: port 2(bridge_slave_1) entered blocking state [ 2625.361312] bridge0: port 2(bridge_slave_1) entered disabled state [ 2625.368404] device bridge_slave_1 entered promiscuous mode [ 2625.402181] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2625.417882] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2625.469029] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2625.476394] team0: Port device team_slave_0 added [ 2625.504948] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2625.512679] team0: Port device team_slave_1 added [ 2625.521033] chnl_net:caif_netlink_parms(): no params data found [ 2625.537918] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2625.551549] IPVS: ftp: loaded support on port[0] = 21 [ 2625.566046] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2625.692745] device hsr_slave_0 entered promiscuous mode [ 2625.730417] device hsr_slave_1 entered promiscuous mode [ 2625.773170] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2625.779896] bridge0: port 1(bridge_slave_0) entered blocking state [ 2625.786376] bridge0: port 1(bridge_slave_0) entered disabled state [ 2625.793580] device bridge_slave_0 entered promiscuous mode [ 2625.802786] bridge0: port 2(bridge_slave_1) entered blocking state [ 2625.809221] bridge0: port 2(bridge_slave_1) entered disabled state [ 2625.816231] device bridge_slave_1 entered promiscuous mode [ 2625.831773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2625.838451] chnl_net:caif_netlink_parms(): no params data found [ 2625.863948] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2625.880624] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2625.919569] bridge0: port 2(bridge_slave_1) entered blocking state [ 2625.925971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2625.932628] bridge0: port 1(bridge_slave_0) entered blocking state [ 2625.939005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2625.946910] IPVS: ftp: loaded support on port[0] = 21 [ 2625.960930] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2625.967999] team0: Port device team_slave_0 added [ 2625.977303] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2625.984695] team0: Port device team_slave_1 added [ 2625.990863] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2625.998186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2626.023685] bridge0: port 1(bridge_slave_0) entered blocking state [ 2626.030656] bridge0: port 1(bridge_slave_0) entered disabled state [ 2626.037631] device bridge_slave_0 entered promiscuous mode [ 2626.049672] bridge0: port 2(bridge_slave_1) entered blocking state [ 2626.056851] bridge0: port 2(bridge_slave_1) entered disabled state [ 2626.063709] device bridge_slave_1 entered promiscuous mode [ 2626.133685] device hsr_slave_0 entered promiscuous mode [ 2626.180441] device hsr_slave_1 entered promiscuous mode [ 2626.227582] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2626.248285] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2626.256087] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2626.337114] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2626.357197] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2626.365165] team0: Port device team_slave_0 added [ 2626.370840] bridge0: port 1(bridge_slave_0) entered disabled state [ 2626.377514] bridge0: port 2(bridge_slave_1) entered disabled state [ 2626.395079] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2626.402651] team0: Port device team_slave_1 added [ 2626.408020] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2626.417980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2626.429614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2626.439963] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2626.448098] chnl_net:caif_netlink_parms(): no params data found [ 2626.522841] device hsr_slave_0 entered promiscuous mode [ 2626.551838] device hsr_slave_1 entered promiscuous mode [ 2626.596672] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2626.611486] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2626.634961] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2626.652079] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2626.728784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2626.741910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2626.754518] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2626.760804] 8021q: adding VLAN 0 to HW filter on device team0 [ 2626.792928] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2626.805420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2626.813431] bridge0: port 1(bridge_slave_0) entered blocking state [ 2626.819827] bridge0: port 1(bridge_slave_0) entered disabled state [ 2626.827678] device bridge_slave_0 entered promiscuous mode [ 2626.835210] bridge0: port 2(bridge_slave_1) entered blocking state [ 2626.841940] bridge0: port 2(bridge_slave_1) entered disabled state [ 2626.848860] device bridge_slave_1 entered promiscuous mode [ 2626.855202] chnl_net:caif_netlink_parms(): no params data found [ 2626.869930] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2626.888260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2626.917076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2626.925291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2626.933222] bridge0: port 1(bridge_slave_0) entered blocking state [ 2626.939644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2626.958177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2626.967930] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2626.976267] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2626.996069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2627.004011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2627.012260] bridge0: port 2(bridge_slave_1) entered blocking state [ 2627.018595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2627.025536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2627.032513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2627.040460] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2627.049559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2627.058706] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2627.065379] 8021q: adding VLAN 0 to HW filter on device team0 [ 2627.071698] bridge0: port 1(bridge_slave_0) entered blocking state [ 2627.078026] bridge0: port 1(bridge_slave_0) entered disabled state [ 2627.086488] device bridge_slave_0 entered promiscuous mode [ 2627.096378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2627.121983] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2627.129151] team0: Port device team_slave_0 added [ 2627.135607] bridge0: port 2(bridge_slave_1) entered blocking state [ 2627.142141] bridge0: port 2(bridge_slave_1) entered disabled state [ 2627.149168] device bridge_slave_1 entered promiscuous mode [ 2627.168632] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2627.176058] team0: Port device team_slave_1 added [ 2627.187371] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2627.194492] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2627.206570] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2627.215568] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2627.223993] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2627.231430] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2627.247907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2627.255698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2627.263393] bridge0: port 1(bridge_slave_0) entered blocking state [ 2627.269715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2627.276687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2627.286333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2627.298450] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2627.324357] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2627.334552] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2627.341455] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2627.348392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2627.355697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2627.363537] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2627.371190] bridge0: port 2(bridge_slave_1) entered blocking state [ 2627.377513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2627.384579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2627.391997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2627.398768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2627.406413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2627.414565] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2627.455544] device hsr_slave_0 entered promiscuous mode [ 2627.500328] device hsr_slave_1 entered promiscuous mode [ 2627.573734] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2627.579849] 8021q: adding VLAN 0 to HW filter on device team0 [ 2627.588054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2627.595818] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2627.603785] team0: Port device team_slave_0 added [ 2627.609301] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2627.616982] team0: Port device team_slave_1 added [ 2627.622617] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2627.629469] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2627.638099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2627.647214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2627.655617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2627.668826] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2627.678399] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2627.687592] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2627.706496] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2627.713996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2627.723309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2627.730926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2627.738478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2627.746583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2627.754313] bridge0: port 1(bridge_slave_0) entered blocking state [ 2627.760682] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2627.767897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2627.776656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2627.797164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2627.806924] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2627.862572] device hsr_slave_0 entered promiscuous mode [ 2627.900318] device hsr_slave_1 entered promiscuous mode [ 2627.980628] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2627.987603] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2627.999683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2628.007378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2628.016345] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2628.028747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2628.039317] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2628.049688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2628.057854] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2628.065518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2628.073942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2628.081843] bridge0: port 2(bridge_slave_1) entered blocking state [ 2628.088173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2628.095121] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2628.105091] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2628.111206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2628.121683] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2628.135317] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2628.145216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2628.152415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2628.160120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2628.167635] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2628.179041] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2628.192303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2628.207918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2628.219839] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2628.230468] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2628.239570] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2628.250718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2628.258439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2628.266192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2628.273813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2628.281754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2628.289262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2628.296884] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2628.304984] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2628.313696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2628.323325] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2628.342512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2628.349923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2628.357691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2628.366154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2628.375468] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2628.381835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2628.402799] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2628.426859] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2628.435618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2628.443582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2628.453711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2628.464870] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2628.471255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2628.492206] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2628.499748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2628.511132] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2628.522628] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2628.529361] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2628.545506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2628.552868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2628.562415] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2628.568603] 8021q: adding VLAN 0 to HW filter on device team0 [ 2628.576925] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2628.587047] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2628.597747] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2628.612731] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2628.622356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2628.632864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2628.640549] bridge0: port 1(bridge_slave_0) entered blocking state [ 2628.646898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2628.654210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2628.666480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2628.685623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2628.704454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2628.713065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2628.721203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2628.728789] bridge0: port 2(bridge_slave_1) entered blocking state [ 2628.735186] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2628.765017] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2628.772809] 8021q: adding VLAN 0 to HW filter on device team0 [ 2628.978667] bridge0: port 2(bridge_slave_1) entered disabled state [ 2628.986987] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:11 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:11 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2629.524486] bridge0: port 2(bridge_slave_1) entered disabled state [ 2629.532975] bridge0: port 1(bridge_slave_0) entered disabled state [ 2629.619036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2629.670759] bridge0: port 2(bridge_slave_1) entered disabled state [ 2629.677356] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:12 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:12 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2629.754318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2629.776084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2629.792566] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2629.816148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2629.830604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2629.849360] bridge0: port 1(bridge_slave_0) entered blocking state [ 2629.855749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2629.880427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2629.898410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2629.908353] bridge0: port 2(bridge_slave_1) entered blocking state [ 2629.914741] bridge0: port 2(bridge_slave_1) entered forwarding state 04:04:12 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2629.937724] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2629.965621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 04:04:12 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2629.983602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2629.991613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2630.019673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 04:04:12 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:12 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2630.054955] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2630.098067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2630.119825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2630.132530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2630.151091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2630.159958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2630.188711] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2630.200399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2630.208119] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2630.230877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2630.238536] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2630.260630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2630.287303] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2630.301661] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2630.320835] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2630.327789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2630.335919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2630.350731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2630.358409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2630.390770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2630.398541] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2630.424265] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2630.461344] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2630.467420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2630.475473] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2630.483499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2630.500708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2630.523788] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2630.531829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2630.539661] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2630.551155] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2630.557196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2630.564704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2630.573994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2630.585153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2630.597961] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2630.618038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2631.732164] bridge0: port 2(bridge_slave_1) entered disabled state [ 2631.740346] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:14 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2632.185998] bridge0: port 2(bridge_slave_1) entered disabled state [ 2632.193933] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:14 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:14 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:14 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="28000000100001080200"/20, @ANYRES32=0x0, @ANYBLOB="001b0000000000"], 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x101000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f00000001c0)={0x0, r3, 0xfffffffffffffffd, 0x5, 0xf72, 0x1ff}) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SMI(r4, 0xaeb7) socket$nl_route(0x10, 0x3, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) finit_module(r5, &(0x7f0000000040)='SE Linux', 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="5af5d46a", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x346}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:14 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2633.140541] device bridge_slave_1 left promiscuous mode [ 2633.146081] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.200801] device bridge_slave_0 left promiscuous mode [ 2633.206322] bridge0: port 1(bridge_slave_0) entered disabled state [ 2633.261542] device bridge_slave_1 left promiscuous mode [ 2633.267036] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.330658] device bridge_slave_0 left promiscuous mode [ 2633.336103] bridge0: port 1(bridge_slave_0) entered disabled state [ 2633.381147] device bridge_slave_1 left promiscuous mode [ 2633.386593] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.431159] device bridge_slave_0 left promiscuous mode [ 2633.436675] bridge0: port 1(bridge_slave_0) entered disabled state [ 2633.491659] device bridge_slave_1 left promiscuous mode [ 2633.497118] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.540739] device bridge_slave_0 left promiscuous mode [ 2633.546223] bridge0: port 1(bridge_slave_0) entered disabled state [ 2633.601147] device bridge_slave_1 left promiscuous mode [ 2633.606626] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.660696] device bridge_slave_0 left promiscuous mode [ 2633.666159] bridge0: port 1(bridge_slave_0) entered disabled state [ 2633.711806] device bridge_slave_1 left promiscuous mode [ 2633.717320] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.780809] device bridge_slave_0 left promiscuous mode [ 2633.786333] bridge0: port 1(bridge_slave_0) entered disabled state [ 2633.872238] device hsr_slave_1 left promiscuous mode [ 2633.923593] device hsr_slave_0 left promiscuous mode [ 2633.973849] team0 (unregistering): Port device team_slave_1 removed [ 2633.983492] team0 (unregistering): Port device team_slave_0 removed [ 2633.993456] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2634.043125] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2634.111285] bond0 (unregistering): Released all slaves [ 2634.212889] device hsr_slave_1 left promiscuous mode [ 2634.252464] device hsr_slave_0 left promiscuous mode [ 2634.303639] team0 (unregistering): Port device team_slave_1 removed [ 2634.324213] team0 (unregistering): Port device team_slave_0 removed [ 2634.343647] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2634.382452] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2634.444499] bond0 (unregistering): Released all slaves [ 2634.522572] device hsr_slave_1 left promiscuous mode [ 2634.563798] device hsr_slave_0 left promiscuous mode [ 2634.604590] team0 (unregistering): Port device team_slave_1 removed [ 2634.613914] team0 (unregistering): Port device team_slave_0 removed [ 2634.623031] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2634.702645] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2634.762754] bond0 (unregistering): Released all slaves [ 2634.851733] device hsr_slave_1 left promiscuous mode [ 2634.903782] device hsr_slave_0 left promiscuous mode [ 2634.944018] team0 (unregistering): Port device team_slave_1 removed [ 2634.953292] team0 (unregistering): Port device team_slave_0 removed [ 2634.963037] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2635.005039] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2635.093102] bond0 (unregistering): Released all slaves [ 2635.181640] device hsr_slave_1 left promiscuous mode [ 2635.237180] device hsr_slave_0 left promiscuous mode [ 2635.274054] team0 (unregistering): Port device team_slave_1 removed [ 2635.283280] team0 (unregistering): Port device team_slave_0 removed [ 2635.293386] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2635.382905] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2635.452848] bond0 (unregistering): Released all slaves [ 2635.542431] device hsr_slave_1 left promiscuous mode [ 2635.582427] device hsr_slave_0 left promiscuous mode [ 2635.622714] team0 (unregistering): Port device team_slave_1 removed [ 2635.632840] team0 (unregistering): Port device team_slave_0 removed [ 2635.641947] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2635.675467] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2635.762090] bond0 (unregistering): Released all slaves [ 2641.411321] IPVS: ftp: loaded support on port[0] = 21 [ 2642.412122] IPVS: ftp: loaded support on port[0] = 21 [ 2642.412217] chnl_net:caif_netlink_parms(): no params data found [ 2642.469640] bridge0: port 1(bridge_slave_0) entered blocking state [ 2642.476235] bridge0: port 1(bridge_slave_0) entered disabled state [ 2642.483456] device bridge_slave_0 entered promiscuous mode [ 2642.494184] bridge0: port 2(bridge_slave_1) entered blocking state [ 2642.500630] bridge0: port 2(bridge_slave_1) entered disabled state [ 2642.507439] device bridge_slave_1 entered promiscuous mode [ 2642.527929] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2642.536847] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2642.559051] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2642.566269] team0: Port device team_slave_0 added [ 2642.571932] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2642.572577] IPVS: ftp: loaded support on port[0] = 21 [ 2642.579045] team0: Port device team_slave_1 added [ 2642.589375] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2642.596661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2642.653875] device hsr_slave_0 entered promiscuous mode [ 2642.692586] device hsr_slave_1 entered promiscuous mode [ 2642.730659] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2642.744704] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2642.815245] bridge0: port 2(bridge_slave_1) entered blocking state [ 2642.821649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2642.828245] bridge0: port 1(bridge_slave_0) entered blocking state [ 2642.834612] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2642.854259] chnl_net:caif_netlink_parms(): no params data found [ 2642.875942] IPVS: ftp: loaded support on port[0] = 21 [ 2642.989733] bridge0: port 1(bridge_slave_0) entered blocking state [ 2642.996778] bridge0: port 1(bridge_slave_0) entered disabled state [ 2643.003752] device bridge_slave_0 entered promiscuous mode [ 2643.010470] chnl_net:caif_netlink_parms(): no params data found [ 2643.035941] bridge0: port 2(bridge_slave_1) entered blocking state [ 2643.042630] bridge0: port 2(bridge_slave_1) entered disabled state [ 2643.049574] device bridge_slave_1 entered promiscuous mode [ 2643.083582] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2643.097529] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2643.103906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2643.111865] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2643.146439] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2643.161015] bridge0: port 1(bridge_slave_0) entered blocking state [ 2643.167401] bridge0: port 1(bridge_slave_0) entered disabled state [ 2643.174981] device bridge_slave_0 entered promiscuous mode [ 2643.186559] bridge0: port 2(bridge_slave_1) entered blocking state [ 2643.193011] bridge0: port 2(bridge_slave_1) entered disabled state [ 2643.199902] device bridge_slave_1 entered promiscuous mode [ 2643.230532] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2643.237634] team0: Port device team_slave_0 added [ 2643.258695] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2643.267948] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2643.274189] 8021q: adding VLAN 0 to HW filter on device team0 [ 2643.280673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2643.288001] bridge0: port 1(bridge_slave_0) entered disabled state [ 2643.295024] bridge0: port 2(bridge_slave_1) entered disabled state [ 2643.303731] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2643.311452] team0: Port device team_slave_1 added [ 2643.369945] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2643.394956] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2643.405282] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2643.417784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2643.425826] bridge0: port 1(bridge_slave_0) entered blocking state [ 2643.432213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2643.439759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2643.447903] bridge0: port 2(bridge_slave_1) entered blocking state [ 2643.454280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2643.461903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2643.469367] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2643.478026] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2643.498402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2643.512846] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2643.519956] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2643.527091] team0: Port device team_slave_0 added [ 2643.532389] chnl_net:caif_netlink_parms(): no params data found [ 2643.542049] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2643.556706] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2643.564100] team0: Port device team_slave_1 added [ 2643.569337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2643.577199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2643.634265] device hsr_slave_0 entered promiscuous mode [ 2643.680667] device hsr_slave_1 entered promiscuous mode [ 2643.740773] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2643.747908] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2643.765713] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2643.773297] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2643.786317] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2643.792819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2643.885593] device hsr_slave_0 entered promiscuous mode [ 2643.930302] device hsr_slave_1 entered promiscuous mode [ 2643.990939] bridge0: port 1(bridge_slave_0) entered blocking state [ 2643.997303] bridge0: port 1(bridge_slave_0) entered disabled state [ 2644.004844] device bridge_slave_0 entered promiscuous mode [ 2644.011618] bridge0: port 2(bridge_slave_1) entered blocking state [ 2644.017962] bridge0: port 2(bridge_slave_1) entered disabled state [ 2644.025473] device bridge_slave_1 entered promiscuous mode [ 2644.046183] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2644.054164] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2644.068452] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2644.076548] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2644.091946] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2644.105247] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2644.112591] team0: Port device team_slave_0 added [ 2644.117782] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2644.135141] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2644.142410] team0: Port device team_slave_1 added [ 2644.147803] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2644.157683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2644.169481] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2644.178063] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2644.254472] device hsr_slave_0 entered promiscuous mode [ 2644.300737] device hsr_slave_1 entered promiscuous mode [ 2644.343809] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2644.356317] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2644.374197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2644.388190] bridge0: port 2(bridge_slave_1) entered blocking state [ 2644.394559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2644.401216] bridge0: port 1(bridge_slave_0) entered blocking state [ 2644.407557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2644.418820] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2644.443510] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2644.469192] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2644.475684] 8021q: adding VLAN 0 to HW filter on device team0 [ 2644.483022] bridge0: port 1(bridge_slave_0) entered disabled state [ 2644.489811] bridge0: port 2(bridge_slave_1) entered disabled state [ 2644.497852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2644.505052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2644.518177] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2644.528692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2644.646510] bridge0: port 2(bridge_slave_1) entered disabled state [ 2644.654241] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:27 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) 04:04:27 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:27 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[]}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95, 0x0, 0xffffffffffffffff}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) dup3(r4, r3, 0x0) ioctl$TIOCGETD(r4, 0x5424, &(0x7f00000001c0)) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0x1000, 0x8}) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7c00070000003c9f0300000000000000c27ed0e81f00020000000067681bfd0700000001000000008243a88ecef652572f8722ecc204a31ffb6c7a2ce69a000000"], 0x305) [ 2644.846590] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2644.860133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2644.868466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2644.905746] bridge0: port 1(bridge_slave_0) entered blocking state [ 2644.912152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2644.942271] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2644.954276] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2644.980325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2644.986648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2644.994284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2645.010458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2645.018037] bridge0: port 2(bridge_slave_1) entered blocking state [ 2645.024424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2645.060357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2645.067281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2645.082333] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2645.110919] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2645.118880] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2645.140516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2645.155750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2645.175808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2645.198425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2645.211488] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2645.217566] 8021q: adding VLAN 0 to HW filter on device team0 [ 2645.242951] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2645.252811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2645.270802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2645.278550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2645.315819] bridge0: port 1(bridge_slave_0) entered blocking state [ 2645.322233] bridge0: port 1(bridge_slave_0) entered forwarding state 04:04:27 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) [ 2645.356978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2645.366247] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2645.398140] 8021q: adding VLAN 0 to HW filter on device team0 [ 2645.407423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2645.421800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2645.440184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 04:04:28 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) [ 2645.447878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2645.466066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2645.480694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2645.510449] bridge0: port 2(bridge_slave_1) entered blocking state [ 2645.516813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2645.532224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2645.541369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2645.566801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2645.588749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2645.613828] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2645.621428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2645.629196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2645.650579] bridge0: port 1(bridge_slave_0) entered blocking state [ 2645.656959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2645.680422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2645.688158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2645.710630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2645.718265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2645.740582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2645.750413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2645.770092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2645.778092] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2645.810884] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2645.816992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2645.845801] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2645.860369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2645.868202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2645.890750] bridge0: port 2(bridge_slave_1) entered blocking state [ 2645.897120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2645.904660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2645.912727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2645.922343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2645.935370] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2645.949161] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2645.961575] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2645.976827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2645.985980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2646.000011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2646.007909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2646.036269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2646.045348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2646.077972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2646.092469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2646.109151] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2646.122133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2646.154871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2646.167659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2646.179485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2646.200963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2646.208506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2646.231782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2646.268100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2646.276846] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2646.288990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2646.309599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2646.320512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2646.329733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2646.345242] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2646.370075] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2646.378879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2646.410581] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2646.417547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2646.431018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2646.438712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2646.460613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2646.468116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2646.497292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2646.524429] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2646.790153] bridge0: port 2(bridge_slave_1) entered disabled state [ 2646.799205] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:29 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2647.023601] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2647.040252] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2647.065106] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2647.075974] 8021q: adding VLAN 0 to HW filter on device batadv0 04:04:29 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:29 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2647.984038] bridge0: port 2(bridge_slave_1) entered disabled state [ 2647.992228] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:30 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2648.347221] bridge0: port 2(bridge_slave_1) entered disabled state [ 2648.355203] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:31 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:31 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:31 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 04:04:31 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2649.210591] device bridge_slave_1 left promiscuous mode [ 2649.216082] bridge0: port 2(bridge_slave_1) entered disabled state [ 2649.270943] device bridge_slave_0 left promiscuous mode [ 2649.276418] bridge0: port 1(bridge_slave_0) entered disabled state [ 2649.331551] device bridge_slave_1 left promiscuous mode [ 2649.336997] bridge0: port 2(bridge_slave_1) entered disabled state [ 2649.391068] device bridge_slave_0 left promiscuous mode [ 2649.396532] bridge0: port 1(bridge_slave_0) entered disabled state [ 2649.451706] device bridge_slave_1 left promiscuous mode [ 2649.457191] bridge0: port 2(bridge_slave_1) entered disabled state [ 2649.500815] device bridge_slave_0 left promiscuous mode [ 2649.506426] bridge0: port 1(bridge_slave_0) entered disabled state [ 2649.561563] device bridge_slave_1 left promiscuous mode [ 2649.567037] bridge0: port 2(bridge_slave_1) entered disabled state [ 2649.611113] device bridge_slave_0 left promiscuous mode [ 2649.616563] bridge0: port 1(bridge_slave_0) entered disabled state [ 2649.681059] device bridge_slave_1 left promiscuous mode [ 2649.686524] bridge0: port 2(bridge_slave_1) entered disabled state [ 2649.740624] device bridge_slave_0 left promiscuous mode [ 2649.746058] bridge0: port 1(bridge_slave_0) entered disabled state [ 2649.832263] device hsr_slave_1 left promiscuous mode [ 2649.875404] device hsr_slave_0 left promiscuous mode [ 2649.934219] team0 (unregistering): Port device team_slave_1 removed [ 2649.943562] team0 (unregistering): Port device team_slave_0 removed [ 2649.953395] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2650.043016] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2650.110860] bond0 (unregistering): Released all slaves [ 2650.192250] device hsr_slave_1 left promiscuous mode [ 2650.233772] device hsr_slave_0 left promiscuous mode [ 2650.275244] team0 (unregistering): Port device team_slave_1 removed [ 2650.284490] team0 (unregistering): Port device team_slave_0 removed [ 2650.293611] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2650.335398] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2650.423785] bond0 (unregistering): Released all slaves [ 2650.531688] device hsr_slave_1 left promiscuous mode [ 2650.572411] device hsr_slave_0 left promiscuous mode [ 2650.632763] team0 (unregistering): Port device team_slave_1 removed [ 2650.643936] team0 (unregistering): Port device team_slave_0 removed [ 2650.653039] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2650.684781] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2650.766961] bond0 (unregistering): Released all slaves [ 2650.882603] device hsr_slave_1 left promiscuous mode [ 2650.923872] device hsr_slave_0 left promiscuous mode [ 2650.964018] team0 (unregistering): Port device team_slave_1 removed [ 2650.974497] team0 (unregistering): Port device team_slave_0 removed [ 2650.983663] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2651.024924] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2651.100747] bond0 (unregistering): Released all slaves [ 2651.201672] device hsr_slave_1 left promiscuous mode [ 2651.253829] device hsr_slave_0 left promiscuous mode [ 2651.322696] team0 (unregistering): Port device team_slave_1 removed [ 2651.333974] team0 (unregistering): Port device team_slave_0 removed [ 2651.342804] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2651.374744] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2651.450593] bond0 (unregistering): Released all slaves [ 2656.140840] IPVS: ftp: loaded support on port[0] = 21 [ 2657.018908] chnl_net:caif_netlink_parms(): no params data found [ 2657.026837] IPVS: ftp: loaded support on port[0] = 21 [ 2657.061518] bridge0: port 1(bridge_slave_0) entered blocking state [ 2657.067875] bridge0: port 1(bridge_slave_0) entered disabled state [ 2657.074781] device bridge_slave_0 entered promiscuous mode [ 2657.084557] bridge0: port 2(bridge_slave_1) entered blocking state [ 2657.091089] bridge0: port 2(bridge_slave_1) entered disabled state [ 2657.097857] device bridge_slave_1 entered promiscuous mode [ 2657.127180] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2657.137788] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2657.158535] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2657.165810] team0: Port device team_slave_0 added [ 2657.166594] IPVS: ftp: loaded support on port[0] = 21 [ 2657.171354] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2657.183247] team0: Port device team_slave_1 added [ 2657.198000] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2657.212245] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2657.283943] device hsr_slave_0 entered promiscuous mode [ 2657.320430] device hsr_slave_1 entered promiscuous mode [ 2657.362578] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2657.378456] IPVS: ftp: loaded support on port[0] = 21 [ 2657.400217] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2657.440851] chnl_net:caif_netlink_parms(): no params data found [ 2657.450056] bridge0: port 2(bridge_slave_1) entered blocking state [ 2657.456402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2657.463041] bridge0: port 1(bridge_slave_0) entered blocking state [ 2657.469370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2657.586211] bridge0: port 1(bridge_slave_0) entered blocking state [ 2657.592866] bridge0: port 1(bridge_slave_0) entered disabled state [ 2657.599709] device bridge_slave_0 entered promiscuous mode [ 2657.606880] bridge0: port 2(bridge_slave_1) entered blocking state [ 2657.613272] bridge0: port 2(bridge_slave_1) entered disabled state [ 2657.620272] device bridge_slave_1 entered promiscuous mode [ 2657.630265] chnl_net:caif_netlink_parms(): no params data found [ 2657.639803] IPVS: ftp: loaded support on port[0] = 21 [ 2657.670526] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2657.681286] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2657.737087] bridge0: port 1(bridge_slave_0) entered blocking state [ 2657.744379] bridge0: port 1(bridge_slave_0) entered disabled state [ 2657.751415] device bridge_slave_0 entered promiscuous mode [ 2657.807573] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2657.814888] team0: Port device team_slave_0 added [ 2657.820954] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2657.827985] team0: Port device team_slave_1 added [ 2657.837053] bridge0: port 2(bridge_slave_1) entered blocking state [ 2657.843464] bridge0: port 2(bridge_slave_1) entered disabled state [ 2657.850480] device bridge_slave_1 entered promiscuous mode [ 2657.865883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2657.888366] chnl_net:caif_netlink_parms(): no params data found [ 2657.897851] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2657.908074] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2657.919149] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2657.936252] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2657.942478] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2657.954420] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2658.008640] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2658.016918] team0: Port device team_slave_0 added [ 2658.076936] device hsr_slave_0 entered promiscuous mode [ 2658.134271] device hsr_slave_1 entered promiscuous mode [ 2658.172822] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2658.178892] 8021q: adding VLAN 0 to HW filter on device team0 [ 2658.196102] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2658.203407] team0: Port device team_slave_1 added [ 2658.208381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2658.215881] bridge0: port 1(bridge_slave_0) entered disabled state [ 2658.222685] bridge0: port 2(bridge_slave_1) entered disabled state [ 2658.229625] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2658.238224] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2658.255900] bridge0: port 1(bridge_slave_0) entered blocking state [ 2658.263272] bridge0: port 1(bridge_slave_0) entered disabled state [ 2658.270433] device bridge_slave_0 entered promiscuous mode [ 2658.318725] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2658.326465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2658.333655] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2658.341692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2658.348698] bridge0: port 2(bridge_slave_1) entered blocking state [ 2658.355764] bridge0: port 2(bridge_slave_1) entered disabled state [ 2658.363008] device bridge_slave_1 entered promiscuous mode [ 2658.384066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2658.392089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2658.399599] bridge0: port 1(bridge_slave_0) entered blocking state [ 2658.405990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2658.417309] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2658.436896] chnl_net:caif_netlink_parms(): no params data found [ 2658.454748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2658.462584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2658.470201] bridge0: port 2(bridge_slave_1) entered blocking state [ 2658.476536] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2658.490335] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2658.543759] device hsr_slave_0 entered promiscuous mode [ 2658.580412] device hsr_slave_1 entered promiscuous mode [ 2658.641705] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2658.649352] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2658.657575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2658.672607] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2658.680765] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2658.688972] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2658.704573] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2658.716227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2658.726659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2658.757226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2658.764897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2658.774383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2658.788354] bridge0: port 1(bridge_slave_0) entered blocking state [ 2658.795643] bridge0: port 1(bridge_slave_0) entered disabled state [ 2658.802840] device bridge_slave_0 entered promiscuous mode [ 2658.809280] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2658.817195] team0: Port device team_slave_0 added [ 2658.822726] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2658.829716] team0: Port device team_slave_1 added [ 2658.835221] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2658.842623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2658.850226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2658.861008] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2658.868248] bridge0: port 2(bridge_slave_1) entered blocking state [ 2658.878078] bridge0: port 2(bridge_slave_1) entered disabled state [ 2658.885313] device bridge_slave_1 entered promiscuous mode [ 2658.891869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2658.914652] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2658.924964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2658.932591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2658.940475] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2658.953399] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2658.961951] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2658.983410] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2658.991911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2658.999370] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2659.008455] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2659.014592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2659.073991] device hsr_slave_0 entered promiscuous mode [ 2659.110520] device hsr_slave_1 entered promiscuous mode [ 2659.186274] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2659.196507] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2659.204740] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2659.214703] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2659.221884] team0: Port device team_slave_0 added [ 2659.227308] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2659.234803] team0: Port device team_slave_1 added [ 2659.249313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2659.256714] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2659.286727] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2659.342570] device hsr_slave_0 entered promiscuous mode [ 2659.400471] device hsr_slave_1 entered promiscuous mode [ 2659.451008] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2659.466807] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2659.475510] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2659.487206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2659.496755] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2659.509591] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2659.529505] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2659.537809] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2659.546568] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2659.552865] 8021q: adding VLAN 0 to HW filter on device team0 [ 2659.571267] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2659.579178] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2659.598253] 8021q: adding VLAN 0 to HW filter on device team0 [ 2659.607753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2659.614758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2659.621710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2659.628449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2659.637157] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2659.653744] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2659.667935] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2659.674979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2659.684372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2659.692474] bridge0: port 1(bridge_slave_0) entered blocking state [ 2659.698804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2659.706079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2659.713779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2659.721529] bridge0: port 2(bridge_slave_1) entered blocking state [ 2659.727855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2659.852466] bridge0: port 2(bridge_slave_1) entered disabled state [ 2659.860403] bridge0: port 1(bridge_slave_0) entered disabled state [ 2660.067181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2660.089595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2660.096905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:04:42 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2660.110958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2660.119877] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2660.131627] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2660.139080] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2660.146976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2660.155503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2660.167749] bridge0: port 1(bridge_slave_0) entered blocking state [ 2660.174142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2660.183161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2660.195150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2660.203443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2660.221285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2660.237750] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2660.246038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2660.255107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2660.262748] bridge0: port 2(bridge_slave_1) entered blocking state [ 2660.269099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2660.276434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2660.285484] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2660.291916] 8021q: adding VLAN 0 to HW filter on device team0 [ 2660.302187] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2660.310965] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2660.320521] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2660.328907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2660.336859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2660.345844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2660.354806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2660.362499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2660.369960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2660.377463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2660.385271] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2660.397510] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2660.406862] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2660.419764] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2660.426894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2660.434804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2660.442782] bridge0: port 1(bridge_slave_0) entered blocking state [ 2660.449121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2660.456136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2660.464014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2660.471552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2660.479156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2660.487076] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2660.497334] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2660.503542] 8021q: adding VLAN 0 to HW filter on device team0 [ 2660.510975] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2660.526390] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2660.535110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2660.546820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2660.556627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2660.567259] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2660.575056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2660.583122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2660.590975] bridge0: port 2(bridge_slave_1) entered blocking state [ 2660.597297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2660.604546] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2660.612883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2660.620921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2660.628456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2660.637531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2660.644833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2660.652350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2660.660540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2660.668033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2660.675604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2660.683386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2660.690876] bridge0: port 1(bridge_slave_0) entered blocking state [ 2660.697202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2660.704079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2660.712253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2660.720918] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2660.726925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2660.735989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2660.747605] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2660.758325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2660.766606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2660.774163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2660.783956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2660.791773] bridge0: port 2(bridge_slave_1) entered blocking state [ 2660.798142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2660.808155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2660.815831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2660.824149] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2660.834643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2660.842248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2660.849506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2660.857691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2660.866968] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2660.873308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2660.883452] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2660.893854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2660.903334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2660.912582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2660.920478] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2660.927886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2660.935738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2660.943411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2660.951326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2660.958158] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2660.966782] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2660.975254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2660.988618] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2661.000186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2661.007827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2661.018056] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2661.031178] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2661.042129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2661.048619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2661.056243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2661.065080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2661.078358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2661.088536] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2661.099703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2661.108741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2661.116478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2661.124674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2661.132299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2661.139644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2661.151329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2661.158534] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2661.171393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2661.184392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2661.193582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2661.202842] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2661.208837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2661.219460] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2661.237325] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2661.250535] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2661.298234] 8021q: adding VLAN 0 to HW filter on device batadv0 04:04:43 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95, 0x0, 0xffffffffffffffff}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) dup3(r3, r2, 0x0) ioctl$VIDIOC_OVERLAY(r3, 0x4004560e, &(0x7f0000000040)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:43 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2661.710295] bridge0: port 2(bridge_slave_1) entered disabled state [ 2661.719063] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:44 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:44 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2662.300128] bridge0: port 2(bridge_slave_1) entered disabled state [ 2662.306659] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:44 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) [ 2662.372528] bridge0: port 2(bridge_slave_1) entered disabled state [ 2662.379131] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:45 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:45 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast1}}, &(0x7f0000000ec0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, 0x0, 0x0, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000b80)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000d80)=[{&(0x7f0000000c00)="5550466fbe6d8a4fa5066ae4afea5d7f34e404896e543fbb3e24e25f9b9a3a5df98f8849d369f0a3b2e4da28998084f5", 0x30}, {&(0x7f0000000c40)}], 0x2, &(0x7f0000000fc0)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB="1c00000000000000010000000200", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r4, @ANYRES32, @ANYBLOB="000000001c0000000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x54, 0x20041010}, 0x58841) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x2, &(0x7f0000000400)=[{&(0x7f00000003c0)="d8aa5f3f86b366805c604025ca3f547ab9af1e1b3dd894", 0x17, 0xffff}, {&(0x7f00000006c0)="471071cc84d389204fd1c97c518fcf9215076738f10d95ed0d01807b2f02513658413ceacd13eab1a58c9e8009b8e0ec83e159ad52165b537c00b02d44edc2acee17937e3f55737c0719ef686d086f22fbda7aac2adb74ab036833a01dfebd113d4536f08fe5f74fd65357a41b541d9bea90de0111abc9c01c939ef1c2c65540b6b4316ede42", 0x86, 0x5}], 0x30000, &(0x7f0000000780)={[{@nodots='nodots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@fat=@codepage={'codepage', 0x3d, '852'}}, {@dots='dots'}], [{@subj_user={'subj_user', 0x3d, '/selinux/enforce\x00'}}, {@measure='measure'}, {@smackfsdef={'smackfsdef', 0x3d, 'security.SMACK64\x00'}}, {@smackfstransmute={'smackfstransmute'}}, {@hash='hash'}, {@dont_appraise='dont_appraise'}, {@fowner_eq={'fowner', 0x3d, r4}}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendto$inet(r9, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x9, &(0x7f0000000180)=0x4) 04:04:45 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) 04:04:45 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:45 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:45 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:45 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 04:04:45 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2663.110530] device bridge_slave_1 left promiscuous mode [ 2663.116115] bridge0: port 2(bridge_slave_1) entered disabled state [ 2663.170808] device bridge_slave_0 left promiscuous mode [ 2663.176314] bridge0: port 1(bridge_slave_0) entered disabled state [ 2663.231526] device bridge_slave_1 left promiscuous mode [ 2663.240687] bridge0: port 2(bridge_slave_1) entered disabled state [ 2663.290807] device bridge_slave_0 left promiscuous mode [ 2663.296383] bridge0: port 1(bridge_slave_0) entered disabled state [ 2663.361452] device bridge_slave_1 left promiscuous mode [ 2663.369975] bridge0: port 2(bridge_slave_1) entered disabled state [ 2663.420620] device bridge_slave_0 left promiscuous mode [ 2663.426070] bridge0: port 1(bridge_slave_0) entered disabled state [ 2663.481161] device bridge_slave_1 left promiscuous mode [ 2663.486614] bridge0: port 2(bridge_slave_1) entered disabled state [ 2663.531042] device bridge_slave_0 left promiscuous mode [ 2663.536513] bridge0: port 1(bridge_slave_0) entered disabled state [ 2663.652927] device hsr_slave_1 left promiscuous mode [ 2663.693995] device hsr_slave_0 left promiscuous mode [ 2663.734288] team0 (unregistering): Port device team_slave_1 removed [ 2663.743670] team0 (unregistering): Port device team_slave_0 removed [ 2663.753097] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2663.813590] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2663.892129] bond0 (unregistering): Released all slaves [ 2663.972199] device hsr_slave_1 left promiscuous mode [ 2664.016086] device hsr_slave_0 left promiscuous mode [ 2664.042690] team0 (unregistering): Port device team_slave_1 removed [ 2664.053160] team0 (unregistering): Port device team_slave_0 removed [ 2664.062290] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2664.114991] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2664.183431] bond0 (unregistering): Released all slaves [ 2664.271691] device hsr_slave_1 left promiscuous mode [ 2664.323743] device hsr_slave_0 left promiscuous mode [ 2664.364197] team0 (unregistering): Port device team_slave_1 removed [ 2664.373588] team0 (unregistering): Port device team_slave_0 removed [ 2664.383483] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2664.424930] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2664.524731] bond0 (unregistering): Released all slaves [ 2664.612021] device hsr_slave_1 left promiscuous mode [ 2664.652418] device hsr_slave_0 left promiscuous mode [ 2664.712836] team0 (unregistering): Port device team_slave_1 removed [ 2664.722895] team0 (unregistering): Port device team_slave_0 removed [ 2664.732137] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2664.773592] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2664.842938] bond0 (unregistering): Released all slaves [ 2668.930892] IPVS: ftp: loaded support on port[0] = 21 [ 2669.742713] chnl_net:caif_netlink_parms(): no params data found [ 2669.751469] IPVS: ftp: loaded support on port[0] = 21 [ 2669.786099] bridge0: port 1(bridge_slave_0) entered blocking state [ 2669.793244] bridge0: port 1(bridge_slave_0) entered disabled state [ 2669.800328] device bridge_slave_0 entered promiscuous mode [ 2669.808680] bridge0: port 2(bridge_slave_1) entered blocking state [ 2669.815329] bridge0: port 2(bridge_slave_1) entered disabled state [ 2669.822559] device bridge_slave_1 entered promiscuous mode [ 2669.851304] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2669.865556] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2669.884716] IPVS: ftp: loaded support on port[0] = 21 [ 2669.892885] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2669.899976] team0: Port device team_slave_0 added [ 2669.907548] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2669.914784] team0: Port device team_slave_1 added [ 2669.920486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2669.927956] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2669.982474] device hsr_slave_0 entered promiscuous mode [ 2670.020316] device hsr_slave_1 entered promiscuous mode [ 2670.060570] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2670.069795] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2670.133223] chnl_net:caif_netlink_parms(): no params data found [ 2670.161338] bridge0: port 2(bridge_slave_1) entered blocking state [ 2670.167691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2670.174285] bridge0: port 1(bridge_slave_0) entered blocking state [ 2670.180641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2670.241886] IPVS: ftp: loaded support on port[0] = 21 [ 2670.254866] bridge0: port 1(bridge_slave_0) entered blocking state [ 2670.264463] bridge0: port 1(bridge_slave_0) entered disabled state [ 2670.271362] device bridge_slave_0 entered promiscuous mode [ 2670.279992] bridge0: port 2(bridge_slave_1) entered blocking state [ 2670.287002] bridge0: port 2(bridge_slave_1) entered disabled state [ 2670.293963] device bridge_slave_1 entered promiscuous mode [ 2670.337606] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2670.352771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2670.369195] chnl_net:caif_netlink_parms(): no params data found [ 2670.415468] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2670.426149] team0: Port device team_slave_0 added [ 2670.441687] IPVS: ftp: loaded support on port[0] = 21 [ 2670.469188] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2670.476298] team0: Port device team_slave_1 added [ 2670.484219] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2670.495600] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2670.502055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2670.557632] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2670.579243] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2670.592871] bridge0: port 1(bridge_slave_0) entered blocking state [ 2670.599205] bridge0: port 1(bridge_slave_0) entered disabled state [ 2670.606385] device bridge_slave_0 entered promiscuous mode [ 2670.616779] bridge0: port 2(bridge_slave_1) entered blocking state [ 2670.623460] bridge0: port 2(bridge_slave_1) entered disabled state [ 2670.633674] device bridge_slave_1 entered promiscuous mode [ 2670.682323] device hsr_slave_0 entered promiscuous mode [ 2670.730439] device hsr_slave_1 entered promiscuous mode [ 2670.770439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2670.777442] bridge0: port 1(bridge_slave_0) entered disabled state [ 2670.784153] bridge0: port 2(bridge_slave_1) entered disabled state [ 2670.791445] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2670.801036] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2670.807099] 8021q: adding VLAN 0 to HW filter on device team0 [ 2670.827460] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2670.834626] chnl_net:caif_netlink_parms(): no params data found [ 2670.859957] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2670.871214] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2670.881930] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2670.894281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2670.902023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2670.909618] bridge0: port 1(bridge_slave_0) entered blocking state [ 2670.915978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2670.929376] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2670.942895] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2670.952698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2670.960417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2670.967894] bridge0: port 2(bridge_slave_1) entered blocking state [ 2670.974281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2670.994988] bridge0: port 1(bridge_slave_0) entered blocking state [ 2671.001595] bridge0: port 1(bridge_slave_0) entered disabled state [ 2671.008386] device bridge_slave_0 entered promiscuous mode [ 2671.017795] bridge0: port 2(bridge_slave_1) entered blocking state [ 2671.024289] bridge0: port 2(bridge_slave_1) entered disabled state [ 2671.031748] device bridge_slave_1 entered promiscuous mode [ 2671.047375] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2671.072806] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2671.080586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2671.096655] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2671.107609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2671.115164] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2671.122530] team0: Port device team_slave_0 added [ 2671.128438] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2671.136221] team0: Port device team_slave_1 added [ 2671.142720] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2671.151284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2671.158885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2671.166644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2671.176159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2671.184651] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2671.200773] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2671.208576] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2671.215941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2671.223469] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2671.237183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2671.245570] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2671.264418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2671.272580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2671.306308] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2671.319064] team0: Port device team_slave_0 added [ 2671.324797] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2671.336419] team0: Port device team_slave_1 added [ 2671.368298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2671.382192] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2671.390335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2671.442673] device hsr_slave_0 entered promiscuous mode [ 2671.480366] device hsr_slave_1 entered promiscuous mode [ 2671.520806] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2671.545534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2671.553198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2671.561186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2671.569417] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2671.577432] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2671.595933] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2671.602075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2671.617305] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2671.694956] device hsr_slave_0 entered promiscuous mode [ 2671.760331] device hsr_slave_1 entered promiscuous mode [ 2671.823092] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2671.830937] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2671.841979] chnl_net:caif_netlink_parms(): no params data found [ 2671.861617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2671.868377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2671.884948] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2671.896686] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2671.908196] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2671.923676] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2671.929838] 8021q: adding VLAN 0 to HW filter on device team0 [ 2671.940357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2671.948136] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2671.971894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2671.979588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2671.988342] bridge0: port 1(bridge_slave_0) entered blocking state [ 2671.994713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2672.002392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2672.011677] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2672.036936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2672.045257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2672.052884] bridge0: port 2(bridge_slave_1) entered blocking state [ 2672.059210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2672.067339] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2672.096125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2672.122431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2672.128980] bridge0: port 1(bridge_slave_0) entered blocking state [ 2672.144285] bridge0: port 1(bridge_slave_0) entered disabled state [ 2672.152018] device bridge_slave_0 entered promiscuous mode [ 2672.158815] bridge0: port 2(bridge_slave_1) entered blocking state [ 2672.169634] bridge0: port 2(bridge_slave_1) entered disabled state [ 2672.176982] device bridge_slave_1 entered promiscuous mode [ 2672.186626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2672.199375] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2672.219405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2672.229676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2672.237608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2672.247378] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2672.385701] bridge0: port 2(bridge_slave_1) entered disabled state [ 2672.394647] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:55 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:55 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2672.623833] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2672.652997] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2672.659186] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2672.668276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2672.678544] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2672.694025] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2672.718082] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2672.727295] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2672.736730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2672.745451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2672.766729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2672.785509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2672.795533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2672.815799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2672.862535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2672.882283] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2672.888356] 8021q: adding VLAN 0 to HW filter on device team0 [ 2672.925677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2672.940656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2672.951945] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2672.960100] 8021q: adding VLAN 0 to HW filter on device team0 [ 2672.970471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2672.979497] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2673.013756] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2673.024426] team0: Port device team_slave_0 added [ 2673.038908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2673.056103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2673.063956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2673.096845] bridge0: port 1(bridge_slave_0) entered blocking state [ 2673.103240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2673.126704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2673.134654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2673.148536] bridge0: port 2(bridge_slave_1) entered blocking state [ 2673.154921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2673.167902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2673.175527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2673.190896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2673.199680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2673.219590] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2673.236657] team0: Port device team_slave_1 added [ 2673.250975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2673.258080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2673.281070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2673.288869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2673.296885] bridge0: port 1(bridge_slave_0) entered blocking state [ 2673.303265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2673.315615] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2673.323461] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2673.329453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2673.342987] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2673.349981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2673.357250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2673.368160] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2673.376139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2673.383758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2673.395947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2673.403697] bridge0: port 2(bridge_slave_1) entered blocking state [ 2673.410072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2673.418596] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2673.442775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2673.450687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2673.458171] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2673.502410] device hsr_slave_0 entered promiscuous mode [ 2673.540528] device hsr_slave_1 entered promiscuous mode [ 2673.600825] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2673.608264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2673.620921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2673.632150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2673.638993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2673.647051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2673.654617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2673.663737] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2673.673561] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2673.682763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2673.694674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2673.703170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2673.710781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2673.719464] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2673.729016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2673.736911] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2673.745196] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2673.754391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2673.764249] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2673.778507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2673.793809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2673.803910] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2673.812960] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2673.827056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2673.835301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2673.843874] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2673.849859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2673.858730] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2673.873990] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2673.884466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2673.893488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2673.917230] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2673.927934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2673.938631] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2673.957984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2673.978492] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2673.988994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2674.016956] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2674.259733] bridge0: port 2(bridge_slave_1) entered disabled state [ 2674.267831] bridge0: port 1(bridge_slave_0) entered disabled state [ 2674.597984] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2674.612854] 8021q: adding VLAN 0 to HW filter on device bond0 04:04:57 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) 04:04:57 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2674.925057] bridge0: port 2(bridge_slave_1) entered disabled state [ 2674.931740] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:57 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) [ 2675.039699] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2675.087578] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2675.100218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2675.107614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2675.132278] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2675.139778] 8021q: adding VLAN 0 to HW filter on device team0 [ 2675.169278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2675.189183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2675.210683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2675.218305] bridge0: port 1(bridge_slave_0) entered blocking state [ 2675.224702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2675.467206] bridge0: port 2(bridge_slave_1) entered disabled state [ 2675.475080] bridge0: port 1(bridge_slave_0) entered disabled state [ 2675.714167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2675.723518] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2675.733727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2675.751003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2675.758609] bridge0: port 2(bridge_slave_1) entered blocking state [ 2675.765004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2675.776105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2675.786658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2675.797606] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2675.804842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2675.817427] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2675.825770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2675.833590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2675.841493] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2675.849899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2675.857269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2675.868165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2675.882982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2675.889824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2675.898028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2675.907438] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2675.914593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2675.922523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2675.931520] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2675.937516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2675.958712] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2675.971391] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2676.678502] bridge0: port 2(bridge_slave_1) entered disabled state [ 2676.686422] bridge0: port 1(bridge_slave_0) entered disabled state 04:04:59 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95, 0x0, 0xffffffffffffffff}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:59 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) 04:04:59 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 04:04:59 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:04:59 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95, 0x0, 0xffffffffffffffff}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) dup3(r2, r1, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x80000) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000180)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @multicast2}, 0x7) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000040)={0xa925, 0x6c04db61907ce95, 0x0, 0xffffffffffffffff}) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) dup3(r8, r7, 0x0) fanotify_mark(r8, 0x38, 0x84001012, r2, &(0x7f00000001c0)='./file0\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="f3af3115e7c69abbff0300f900", @ANYRES16=0x0, @ANYBLOB="20000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812757da3521cbb9ba82c6afc00000000c46f0006000000070000003c9f0300000000000000c228d0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"], 0x305) write$P9_RLINK(r4, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0x7) tee(r5, 0xffffffffffffffff, 0x3ff, 0x6) [ 2677.174634] device bridge_slave_1 left promiscuous mode [ 2677.182433] bridge0: port 2(bridge_slave_1) entered disabled state [ 2677.236563] device bridge_slave_0 left promiscuous mode [ 2677.242512] bridge0: port 1(bridge_slave_0) entered disabled state [ 2677.297273] device bridge_slave_1 left promiscuous mode [ 2677.316263] bridge0: port 2(bridge_slave_1) entered disabled state [ 2677.376834] device bridge_slave_0 left promiscuous mode [ 2677.383240] bridge0: port 1(bridge_slave_0) entered disabled state [ 2677.441488] device bridge_slave_1 left promiscuous mode [ 2677.446993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2677.520808] device bridge_slave_0 left promiscuous mode [ 2677.526297] bridge0: port 1(bridge_slave_0) entered disabled state [ 2677.581480] device bridge_slave_1 left promiscuous mode [ 2677.586976] bridge0: port 2(bridge_slave_1) entered disabled state [ 2677.660821] device bridge_slave_0 left promiscuous mode [ 2677.666309] bridge0: port 1(bridge_slave_0) entered disabled state [ 2677.721545] device bridge_slave_1 left promiscuous mode [ 2677.727051] bridge0: port 2(bridge_slave_1) entered disabled state [ 2677.804674] device bridge_slave_0 left promiscuous mode [ 2677.810229] bridge0: port 1(bridge_slave_0) entered disabled state [ 2677.923582] device hsr_slave_1 left promiscuous mode [ 2677.973754] device hsr_slave_0 left promiscuous mode [ 2678.002756] team0 (unregistering): Port device team_slave_1 removed [ 2678.012485] team0 (unregistering): Port device team_slave_0 removed [ 2678.021705] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2678.074745] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2678.162254] bond0 (unregistering): Released all slaves [ 2678.251628] device hsr_slave_1 left promiscuous mode [ 2678.303748] device hsr_slave_0 left promiscuous mode [ 2678.352709] team0 (unregistering): Port device team_slave_1 removed [ 2678.362383] team0 (unregistering): Port device team_slave_0 removed [ 2678.371457] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2678.415222] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2678.490708] bond0 (unregistering): Released all slaves [ 2678.581789] device hsr_slave_1 left promiscuous mode [ 2678.622468] device hsr_slave_0 left promiscuous mode [ 2678.662718] team0 (unregistering): Port device team_slave_1 removed [ 2678.672627] team0 (unregistering): Port device team_slave_0 removed [ 2678.682032] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2678.714996] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2678.771993] bond0 (unregistering): Released all slaves [ 2678.882304] device hsr_slave_1 left promiscuous mode [ 2678.933233] device hsr_slave_0 left promiscuous mode [ 2678.973126] team0 (unregistering): Port device team_slave_1 removed [ 2678.983587] team0 (unregistering): Port device team_slave_0 removed [ 2678.992682] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2679.013066] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2679.101509] bond0 (unregistering): Released all slaves [ 2679.212144] device hsr_slave_1 left promiscuous mode [ 2679.253862] device hsr_slave_0 left promiscuous mode [ 2679.294026] team0 (unregistering): Port device team_slave_1 removed [ 2679.303238] team0 (unregistering): Port device team_slave_0 removed [ 2679.312818] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2679.334963] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2679.421089] bond0 (unregistering): Released all slaves [ 2684.171314] IPVS: ftp: loaded support on port[0] = 21 [ 2685.173093] IPVS: ftp: loaded support on port[0] = 21 [ 2685.195922] chnl_net:caif_netlink_parms(): no params data found [ 2685.246183] IPVS: ftp: loaded support on port[0] = 21 [ 2685.264900] bridge0: port 1(bridge_slave_0) entered blocking state [ 2685.271728] bridge0: port 1(bridge_slave_0) entered disabled state [ 2685.278539] device bridge_slave_0 entered promiscuous mode [ 2685.285586] bridge0: port 2(bridge_slave_1) entered blocking state [ 2685.292027] bridge0: port 2(bridge_slave_1) entered disabled state [ 2685.298948] device bridge_slave_1 entered promiscuous mode [ 2685.319718] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2685.334287] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2685.367762] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2685.375029] team0: Port device team_slave_0 added [ 2685.420677] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2685.427764] team0: Port device team_slave_1 added [ 2685.436076] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2685.451439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2685.458611] chnl_net:caif_netlink_parms(): no params data found [ 2685.466147] IPVS: ftp: loaded support on port[0] = 21 [ 2685.532309] device hsr_slave_0 entered promiscuous mode [ 2685.570363] device hsr_slave_1 entered promiscuous mode [ 2685.650533] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2685.659555] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2685.745559] chnl_net:caif_netlink_parms(): no params data found [ 2685.764502] bridge0: port 1(bridge_slave_0) entered blocking state [ 2685.770999] bridge0: port 1(bridge_slave_0) entered disabled state [ 2685.777875] device bridge_slave_0 entered promiscuous mode [ 2685.787006] bridge0: port 2(bridge_slave_1) entered blocking state [ 2685.793490] bridge0: port 2(bridge_slave_1) entered disabled state [ 2685.800765] device bridge_slave_1 entered promiscuous mode [ 2685.826389] bridge0: port 2(bridge_slave_1) entered blocking state [ 2685.832823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2685.839471] bridge0: port 1(bridge_slave_0) entered blocking state [ 2685.845854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2685.853576] IPVS: ftp: loaded support on port[0] = 21 [ 2685.869799] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2685.898811] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2685.952604] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2685.959736] team0: Port device team_slave_0 added [ 2685.978662] bridge0: port 1(bridge_slave_0) entered blocking state [ 2685.985443] bridge0: port 1(bridge_slave_0) entered disabled state [ 2685.992699] device bridge_slave_0 entered promiscuous mode [ 2686.037591] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2686.045677] team0: Port device team_slave_1 added [ 2686.051150] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2686.058166] bridge0: port 2(bridge_slave_1) entered blocking state [ 2686.064727] bridge0: port 2(bridge_slave_1) entered disabled state [ 2686.072018] device bridge_slave_1 entered promiscuous mode [ 2686.100333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2686.113280] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2686.119340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2686.133928] chnl_net:caif_netlink_parms(): no params data found [ 2686.157941] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2686.165544] IPVS: ftp: loaded support on port[0] = 21 [ 2686.175794] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2686.186640] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2686.264325] device hsr_slave_0 entered promiscuous mode [ 2686.300379] device hsr_slave_1 entered promiscuous mode [ 2686.340776] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2686.361992] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2686.369118] team0: Port device team_slave_0 added [ 2686.378423] bridge0: port 1(bridge_slave_0) entered disabled state [ 2686.385156] bridge0: port 2(bridge_slave_1) entered disabled state [ 2686.392699] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2686.402222] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2686.429974] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2686.437788] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2686.445625] team0: Port device team_slave_1 added [ 2686.451206] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2686.458208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2686.465160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2686.474981] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2686.481408] 8021q: adding VLAN 0 to HW filter on device team0 [ 2686.487547] bridge0: port 1(bridge_slave_0) entered blocking state [ 2686.494137] bridge0: port 1(bridge_slave_0) entered disabled state [ 2686.501640] device bridge_slave_0 entered promiscuous mode [ 2686.511587] bridge0: port 2(bridge_slave_1) entered blocking state [ 2686.517921] bridge0: port 2(bridge_slave_1) entered disabled state [ 2686.524889] device bridge_slave_1 entered promiscuous mode [ 2686.532592] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2686.569563] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2686.582260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2686.634474] device hsr_slave_0 entered promiscuous mode [ 2686.700311] device hsr_slave_1 entered promiscuous mode [ 2686.743154] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2686.750209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2686.757942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2686.765644] bridge0: port 1(bridge_slave_0) entered blocking state [ 2686.771996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2686.782291] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2686.832167] chnl_net:caif_netlink_parms(): no params data found [ 2686.851774] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2686.875827] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2686.889089] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2686.896914] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2686.904313] team0: Port device team_slave_0 added [ 2686.909950] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2686.917505] team0: Port device team_slave_1 added [ 2686.922859] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2686.934403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2686.942164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2686.949641] bridge0: port 2(bridge_slave_1) entered blocking state [ 2686.956014] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2686.969664] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2686.988609] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2686.996657] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2687.009516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2687.023435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2687.036036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2687.066685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2687.103971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2687.117249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2687.128545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2687.156079] bridge0: port 1(bridge_slave_0) entered blocking state [ 2687.163113] bridge0: port 1(bridge_slave_0) entered disabled state [ 2687.175077] device bridge_slave_0 entered promiscuous mode [ 2687.232974] device hsr_slave_0 entered promiscuous mode [ 2687.271689] device hsr_slave_1 entered promiscuous mode [ 2687.348086] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2687.355007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2687.362759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2687.372115] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2687.384758] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2687.391730] bridge0: port 2(bridge_slave_1) entered blocking state [ 2687.398073] bridge0: port 2(bridge_slave_1) entered disabled state [ 2687.405882] device bridge_slave_1 entered promiscuous mode [ 2687.415426] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2687.442092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2687.449519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2687.458538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2687.477604] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2687.492431] chnl_net:caif_netlink_parms(): no params data found [ 2687.501617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2687.509042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2687.517532] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2687.525605] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2687.535707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2687.564156] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2687.575195] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2687.592479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2687.599257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2687.609053] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2687.615405] 8021q: adding VLAN 0 to HW filter on device team0 [ 2687.622915] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2687.653137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2687.673891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2687.682564] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2687.689535] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2687.697418] team0: Port device team_slave_0 added [ 2687.704458] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2687.717644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2687.725504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2687.733292] bridge0: port 1(bridge_slave_0) entered blocking state [ 2687.739621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2687.746772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2687.763237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2687.770780] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2687.777885] team0: Port device team_slave_1 added [ 2687.783367] bridge0: port 1(bridge_slave_0) entered blocking state [ 2687.789707] bridge0: port 1(bridge_slave_0) entered disabled state [ 2687.797213] device bridge_slave_0 entered promiscuous mode [ 2687.806201] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2687.812789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2687.820727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2687.828221] bridge0: port 2(bridge_slave_1) entered blocking state [ 2687.834585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2687.848550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2687.856545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2687.864486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2687.872136] bridge0: port 2(bridge_slave_1) entered blocking state [ 2687.878466] bridge0: port 2(bridge_slave_1) entered disabled state [ 2687.887253] device bridge_slave_1 entered promiscuous mode [ 2687.911660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2687.920275] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2687.938129] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2687.947612] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2687.957415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2687.964625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2687.972699] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2687.981370] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2687.987440] 8021q: adding VLAN 0 to HW filter on device team0 [ 2688.002453] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2688.039606] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2688.047679] team0: Port device team_slave_0 added [ 2688.053912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2688.063994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2688.092703] device hsr_slave_0 entered promiscuous mode [ 2688.130346] device hsr_slave_1 entered promiscuous mode [ 2688.170736] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2688.181784] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2688.188021] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2688.195097] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2688.202340] team0: Port device team_slave_1 added [ 2688.207698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2688.215618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2688.223476] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2688.236931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2688.246503] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2688.257947] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2688.265532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2688.274642] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2688.283688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2688.295545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2688.305729] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2688.312512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2688.320312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2688.327799] bridge0: port 1(bridge_slave_0) entered blocking state [ 2688.334181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2688.345872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2688.353963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2688.367828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2688.382764] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2688.391630] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2688.399030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2688.407120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2688.415179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2688.423320] bridge0: port 2(bridge_slave_1) entered blocking state [ 2688.429748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2688.436665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2688.443613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2688.452260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2688.460452] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2688.471103] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2688.477148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2688.485798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2688.505659] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2688.513443] 8021q: adding VLAN 0 to HW filter on device team0 [ 2688.647421] bridge0: port 2(bridge_slave_1) entered disabled state [ 2688.655518] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:11 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2688.873781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2688.882308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2688.890222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2688.912594] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2688.920915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2688.931434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2688.953527] device hsr_slave_0 entered promiscuous mode [ 2689.000406] device hsr_slave_1 entered promiscuous mode [ 2689.041332] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2689.048433] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2689.058238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2689.065908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2689.073612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2689.081238] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2689.090553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2689.099391] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2689.112146] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2689.127284] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2689.134922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2689.143251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2689.151122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2689.158725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2689.166621] bridge0: port 1(bridge_slave_0) entered blocking state [ 2689.172994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2689.180497] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 04:05:11 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2689.190972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2689.201682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2689.213443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2689.222467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2689.229881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 04:05:11 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2689.238000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2689.245927] bridge0: port 2(bridge_slave_1) entered blocking state [ 2689.252317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2689.267118] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2689.275662] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2689.316475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2689.340408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2689.347869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2689.370686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2689.381882] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2689.387903] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2689.418095] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2689.435204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2689.449923] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2689.473129] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2689.499329] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2689.518422] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2689.532028] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2689.538686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2689.548980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2689.570295] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2689.605098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2689.626421] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2689.635102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2689.648927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2689.670349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2689.687218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2689.953738] bridge0: port 2(bridge_slave_1) entered disabled state [ 2689.962245] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:12 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2690.235238] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2690.248406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2690.264249] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2690.271011] 8021q: adding VLAN 0 to HW filter on device team0 [ 2690.277321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2690.288683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2690.298401] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2690.312210] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2690.319965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2690.334120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2690.343665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2690.350839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2690.358520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2690.366762] bridge0: port 1(bridge_slave_0) entered blocking state [ 2690.373133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2690.379874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2690.387503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2690.395548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2690.409230] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2690.417966] 8021q: adding VLAN 0 to HW filter on device team0 [ 2690.429945] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2690.438855] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2690.445528] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2690.452891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2690.461858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2690.469786] bridge0: port 2(bridge_slave_1) entered blocking state [ 2690.476225] bridge0: port 2(bridge_slave_1) entered forwarding state 04:05:13 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2690.487742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2690.503931] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2690.522616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2690.531084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2690.538687] bridge0: port 1(bridge_slave_0) entered blocking state [ 2690.545088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2690.554760] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 04:05:13 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2690.818382] bridge0: port 2(bridge_slave_1) entered disabled state [ 2690.827350] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:13 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2691.258956] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2691.277780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2691.295386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2691.322196] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2691.331964] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2691.342184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2691.349877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2691.385863] bridge0: port 2(bridge_slave_1) entered blocking state [ 2691.392368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2691.412254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2691.432536] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2691.444293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2691.458159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2691.466618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2691.474327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2691.487051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2691.499178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2691.506633] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2691.514024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2691.522184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2691.529712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 04:05:14 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2691.539174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2691.558984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2691.573109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2691.598145] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2691.606959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2691.617457] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2691.626716] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2691.634973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 04:05:14 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2691.642795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2691.650953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2691.658689] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2691.666840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2691.674551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2691.684656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2691.951075] bridge0: port 2(bridge_slave_1) entered disabled state [ 2691.960307] bridge0: port 1(bridge_slave_0) entered disabled state [ 2692.384070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2692.399481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2692.408702] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2692.415604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2692.424298] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2692.436484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2692.444415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2692.455425] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2692.484252] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2692.501875] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2692.532269] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2693.331410] bridge0: port 2(bridge_slave_1) entered disabled state [ 2693.339539] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:16 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e8"}, 0x2e) 04:05:16 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2693.902488] bridge0: port 2(bridge_slave_1) entered disabled state [ 2693.911908] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:16 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000180)=@generic={0x14, "f2348a22694e7cf57df9b0f357bb41f27822128cd909d9430a57f8fd004a500cfb4bec66da46d844a39f0fc1be676762da2adf99b747b79eb2a827762ded23293625cd054a1ca13f692e23212580809c7245dcd58a268f423fff4be9bfe1509b3a40f011e5899eef56b6ff3efc7560395d73ae9745e8d5076ca8013f5243"}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000380)="dc041cddaa2bec12fd7dcb6512c9429b38b21bbf26ae28ee9fbe949ef83cb580491de264fc9efc9afdc838777b9bcc1c32bcc51e1d388445fe126a2eccf619d64e73f1ed12af01fe3d455f7a8b35b9179c7585eaf181ae93bdd846386ddcef61b6a839", 0x63}, {&(0x7f0000000580)="e8a51309c0b8d49a71997ce7d6673b852638b7622e75f925c62b8f2099270d5dad828ed21017bd927fe9b984edb85e889249925e6b4c926caead85c330a09a2bf9e5c9cd41ae7ba2616efc75fe44b41de5b7ab2b9a02901576fa47a2043269e221b1a29626bd95e3b7dd5f380c6f6f45cb2727872a82554826a1cba7957e0c968ccaa2efbb2cee4763f8618da604b279e0b95b5193c5bd334e3546866ccd33e29bf46225c869573b7d68522d835188822176cafdbc00ebdbcfc4", 0xba}], 0x2, &(0x7f0000000400)=[{0x60, 0x25, 0x4, "e6bdaf5cc9cefd63cc10eb013aa74ef83cd805032b5c2431b050116b30d2de18be8d093b43830042a94af4d42b6146d744e5b92dd47ba0eb178dfd5b2cde68bf8b6e7878944b993ce0af"}], 0x60}, 0x8040000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:05:16 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e8"}, 0x2e) 04:05:16 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e8"}, 0x2e) [ 2694.530666] device bridge_slave_1 left promiscuous mode [ 2694.536289] bridge0: port 2(bridge_slave_1) entered disabled state [ 2694.590790] device bridge_slave_0 left promiscuous mode [ 2694.596430] bridge0: port 1(bridge_slave_0) entered disabled state [ 2694.651389] device bridge_slave_1 left promiscuous mode [ 2694.656991] bridge0: port 2(bridge_slave_1) entered disabled state [ 2694.710779] device bridge_slave_0 left promiscuous mode [ 2694.716294] bridge0: port 1(bridge_slave_0) entered disabled state [ 2694.791616] device bridge_slave_1 left promiscuous mode [ 2694.797320] bridge0: port 2(bridge_slave_1) entered disabled state [ 2694.851063] device bridge_slave_0 left promiscuous mode [ 2694.856550] bridge0: port 1(bridge_slave_0) entered disabled state [ 2694.911186] device bridge_slave_1 left promiscuous mode [ 2694.916699] bridge0: port 2(bridge_slave_1) entered disabled state [ 2694.970774] device bridge_slave_0 left promiscuous mode [ 2694.976244] bridge0: port 1(bridge_slave_0) entered disabled state [ 2695.021414] device bridge_slave_1 left promiscuous mode [ 2695.027021] bridge0: port 2(bridge_slave_1) entered disabled state [ 2695.080792] device bridge_slave_0 left promiscuous mode [ 2695.086331] bridge0: port 1(bridge_slave_0) entered disabled state [ 2695.161645] device hsr_slave_1 left promiscuous mode [ 2695.213352] device hsr_slave_0 left promiscuous mode [ 2695.262866] team0 (unregistering): Port device team_slave_1 removed [ 2695.273282] team0 (unregistering): Port device team_slave_0 removed [ 2695.283704] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2695.344499] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2695.421649] bond0 (unregistering): Released all slaves [ 2695.522462] device hsr_slave_1 left promiscuous mode [ 2695.564039] device hsr_slave_0 left promiscuous mode [ 2695.614126] team0 (unregistering): Port device team_slave_1 removed [ 2695.623473] team0 (unregistering): Port device team_slave_0 removed [ 2695.632975] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2695.673454] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2695.757700] bond0 (unregistering): Released all slaves [ 2695.881868] device hsr_slave_1 left promiscuous mode [ 2695.913481] device hsr_slave_0 left promiscuous mode [ 2695.954022] team0 (unregistering): Port device team_slave_1 removed [ 2695.963475] team0 (unregistering): Port device team_slave_0 removed [ 2695.973788] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2696.023125] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2696.095305] bond0 (unregistering): Released all slaves [ 2696.202491] device hsr_slave_1 left promiscuous mode [ 2696.262532] device hsr_slave_0 left promiscuous mode [ 2696.302581] team0 (unregistering): Port device team_slave_1 removed [ 2696.312989] team0 (unregistering): Port device team_slave_0 removed [ 2696.322074] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2696.363264] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2696.440534] bond0 (unregistering): Released all slaves [ 2696.552577] device hsr_slave_1 left promiscuous mode [ 2696.594949] device hsr_slave_0 left promiscuous mode [ 2696.653701] team0 (unregistering): Port device team_slave_1 removed [ 2696.664590] team0 (unregistering): Port device team_slave_0 removed [ 2696.675227] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2696.734003] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2696.816472] bond0 (unregistering): Released all slaves [ 2701.470869] IPVS: ftp: loaded support on port[0] = 21 [ 2702.412208] IPVS: ftp: loaded support on port[0] = 21 [ 2702.420989] chnl_net:caif_netlink_parms(): no params data found [ 2702.479337] bridge0: port 1(bridge_slave_0) entered blocking state [ 2702.486090] bridge0: port 1(bridge_slave_0) entered disabled state [ 2702.492926] device bridge_slave_0 entered promiscuous mode [ 2702.506862] IPVS: ftp: loaded support on port[0] = 21 [ 2702.515068] bridge0: port 2(bridge_slave_1) entered blocking state [ 2702.521638] bridge0: port 2(bridge_slave_1) entered disabled state [ 2702.528799] device bridge_slave_1 entered promiscuous mode [ 2702.559493] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2702.604480] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2702.633882] chnl_net:caif_netlink_parms(): no params data found [ 2702.643644] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2702.650850] team0: Port device team_slave_0 added [ 2702.658457] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2702.665794] team0: Port device team_slave_1 added [ 2702.682350] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2702.695119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2702.710666] IPVS: ftp: loaded support on port[0] = 21 [ 2702.792721] device hsr_slave_0 entered promiscuous mode [ 2702.830373] device hsr_slave_1 entered promiscuous mode [ 2702.884603] bridge0: port 1(bridge_slave_0) entered blocking state [ 2702.891228] bridge0: port 1(bridge_slave_0) entered disabled state [ 2702.898057] device bridge_slave_0 entered promiscuous mode [ 2702.904932] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2702.912005] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2702.923934] bridge0: port 2(bridge_slave_1) entered blocking state [ 2702.930510] bridge0: port 2(bridge_slave_1) entered disabled state [ 2702.937345] device bridge_slave_1 entered promiscuous mode [ 2702.957026] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2702.984532] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2703.035021] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2703.042527] team0: Port device team_slave_0 added [ 2703.050284] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2703.057313] team0: Port device team_slave_1 added [ 2703.062870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2703.088739] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2703.099340] bridge0: port 2(bridge_slave_1) entered blocking state [ 2703.105753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2703.112419] bridge0: port 1(bridge_slave_0) entered blocking state [ 2703.118779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2703.126856] IPVS: ftp: loaded support on port[0] = 21 [ 2703.135930] chnl_net:caif_netlink_parms(): no params data found [ 2703.193002] device hsr_slave_0 entered promiscuous mode [ 2703.230351] device hsr_slave_1 entered promiscuous mode [ 2703.284533] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2703.322613] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2703.383059] bridge0: port 1(bridge_slave_0) entered blocking state [ 2703.389409] bridge0: port 1(bridge_slave_0) entered disabled state [ 2703.399642] device bridge_slave_0 entered promiscuous mode [ 2703.408851] bridge0: port 2(bridge_slave_1) entered blocking state [ 2703.415376] bridge0: port 2(bridge_slave_1) entered disabled state [ 2703.422356] device bridge_slave_1 entered promiscuous mode [ 2703.434881] bridge0: port 1(bridge_slave_0) entered disabled state [ 2703.441550] bridge0: port 2(bridge_slave_1) entered disabled state [ 2703.477701] chnl_net:caif_netlink_parms(): no params data found [ 2703.497370] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2703.505530] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2703.543613] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2703.593242] bridge0: port 1(bridge_slave_0) entered blocking state [ 2703.599641] bridge0: port 1(bridge_slave_0) entered disabled state [ 2703.606980] device bridge_slave_0 entered promiscuous mode [ 2703.613551] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2703.621105] team0: Port device team_slave_0 added [ 2703.678808] chnl_net:caif_netlink_parms(): no params data found [ 2703.693963] bridge0: port 2(bridge_slave_1) entered blocking state [ 2703.700752] bridge0: port 2(bridge_slave_1) entered disabled state [ 2703.707547] device bridge_slave_1 entered promiscuous mode [ 2703.714158] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2703.721798] team0: Port device team_slave_1 added [ 2703.727049] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2703.737516] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2703.760272] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2703.775978] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2703.786690] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2703.808553] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2703.817740] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2703.835773] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2703.851499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2703.858318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2703.879921] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2703.922995] device hsr_slave_0 entered promiscuous mode [ 2703.964449] device hsr_slave_1 entered promiscuous mode [ 2704.002081] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2704.008180] 8021q: adding VLAN 0 to HW filter on device team0 [ 2704.034838] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2704.047677] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2704.055574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2704.066940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2704.074235] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2704.081627] team0: Port device team_slave_0 added [ 2704.087116] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2704.094601] team0: Port device team_slave_1 added [ 2704.099673] bridge0: port 1(bridge_slave_0) entered blocking state [ 2704.106606] bridge0: port 1(bridge_slave_0) entered disabled state [ 2704.113886] device bridge_slave_0 entered promiscuous mode [ 2704.120484] bridge0: port 2(bridge_slave_1) entered blocking state [ 2704.126817] bridge0: port 2(bridge_slave_1) entered disabled state [ 2704.134102] device bridge_slave_1 entered promiscuous mode [ 2704.140502] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2704.147379] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2704.155891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2704.172339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2704.179971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2704.187588] bridge0: port 1(bridge_slave_0) entered blocking state [ 2704.193938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2704.201200] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2704.221971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2704.229972] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2704.236180] 8021q: adding VLAN 0 to HW filter on device team0 [ 2704.250333] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2704.266944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2704.275112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2704.283014] bridge0: port 2(bridge_slave_1) entered blocking state [ 2704.289346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2704.332450] device hsr_slave_0 entered promiscuous mode [ 2704.370325] device hsr_slave_1 entered promiscuous mode [ 2704.420851] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2704.428718] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2704.437974] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2704.450161] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2704.458909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2704.467725] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2704.485544] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2704.494348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2704.506244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2704.514149] bridge0: port 1(bridge_slave_0) entered blocking state [ 2704.520540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2704.527860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2704.537780] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2704.553506] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2704.571722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2704.580518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2704.588146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2704.596219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2704.603891] bridge0: port 2(bridge_slave_1) entered blocking state [ 2704.610274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2704.632066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2704.640305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2704.657052] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2704.664506] team0: Port device team_slave_0 added [ 2704.669698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2704.678031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2704.685645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2704.693401] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2704.706436] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2704.723269] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2704.730694] team0: Port device team_slave_1 added [ 2704.737079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2704.744694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2704.755485] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2704.763442] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2704.771880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2704.779309] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2704.786968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2704.794636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2704.802779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2704.810786] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2704.819908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2704.831077] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2704.841096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2704.855128] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2704.855548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2704.869612] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2704.878441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2704.885996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2704.895613] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2704.910702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2704.918635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2704.929449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2704.940980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2704.947843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2704.955902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2704.965540] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2705.014089] device hsr_slave_0 entered promiscuous mode [ 2705.050599] device hsr_slave_1 entered promiscuous mode [ 2705.111290] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2705.117697] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2705.124894] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2705.132644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2705.144151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2705.153001] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2705.159060] 8021q: adding VLAN 0 to HW filter on device team0 [ 2705.167036] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2705.181480] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2705.187549] 8021q: adding VLAN 0 to HW filter on device team0 [ 2705.196098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2705.204201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2705.211402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2705.218244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2705.226327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2705.234109] bridge0: port 1(bridge_slave_0) entered blocking state [ 2705.240511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2705.251754] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2705.258844] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2705.265849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2705.274042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2705.284734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2705.292805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2705.299815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2705.307821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2705.315395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2705.323315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2705.331346] bridge0: port 1(bridge_slave_0) entered blocking state [ 2705.337676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2705.345127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2705.357327] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2705.367415] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2705.381580] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2705.387585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2705.395815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2705.404095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2705.411795] bridge0: port 2(bridge_slave_1) entered blocking state [ 2705.418118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2705.427406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2705.441298] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2705.448587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2705.472172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2705.485603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2705.493665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2705.501871] bridge0: port 2(bridge_slave_1) entered blocking state [ 2705.508202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2705.516976] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2705.528327] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2705.537006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2705.548754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2705.557346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2705.567488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2705.579024] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2705.588420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2705.596189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2705.604209] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2705.611912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2705.619608] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2705.627451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2705.636005] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2705.647520] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2705.656274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2705.665526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2705.677000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2705.685858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2705.693618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2705.702343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2705.711981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2705.734881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2705.746132] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2705.754546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2705.762216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2705.769779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2705.778514] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2705.786987] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2705.793490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2705.945632] bridge0: port 2(bridge_slave_1) entered disabled state [ 2705.953780] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:28 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:05:28 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x3, [@int={0x10, 0x0, 0x0, 0x1, 0x0, 0x56, 0x0, 0x48, 0x4}, @struct={0x10, 0x3, 0x0, 0x4, 0x1, 0x82, [{0xa, 0x2, 0x5}, {0x1, 0x1, 0x1f}, {0x1, 0x1, 0x8}]}, @union={0xa, 0x3, 0x0, 0x5, 0x1, 0x401, [{0xd, 0x0, 0x8}, {0xf, 0x5, 0x7}, {0x5, 0x0, 0x80}]}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x57, 0x0, 0xb, 0x1}, @enum={0xe, 0x2, 0x0, 0x6, 0x4, [{0x3, 0x6}, {0x8, 0x7081}]}]}, {0x0, [0x61]}}, &(0x7f00000006c0)=""/108, 0xb7, 0x6c, 0x1}, 0x20) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000900)={0x1, 0x2, 0x1000, 0x4d, &(0x7f0000000780)="8102a26bca3291d618c47ee907047c21a2b0711502c7744316f2518c857bb3bf7940cd0166ae4cc88e78f6ee4f8be7c0886aa158151b807382bda74231a11670c0cba7ff455db194e3c84bfc4e", 0xce, 0x0, &(0x7f0000000800)="be57424660abc4c8fa891639781a497ab685858a377a7fe342818f61c0e069186a92adc3162381bef74ebb91e38861b1502d472fb52fd8c9a4abb2791c6dd2dcbaab31c7f79a1f7492c428ea7ff0ed90fa221339b35e72fec34daed4162f4a08dba4220432e96ccfc949caae06baaf4345be37a1c4e8095b30d50a94fb4f435b201e302102f25e93df8fa42f1e16c122faf91cc7cae7ecf3c1ab20f4b376e5e59814e7c18b14b34813cdcc3570c97b54a4e04215dd04b9b1b3b747d2579e0c432e514cc409edf9d1fc234902ff0e"}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000040)) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000000100001080200"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x44c4423b67c7d7cd, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000380)={0x3, &(0x7f00000001c0)=[{}, {}, {}]}) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0xfffffe88}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812001d0000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000010000000067681bfd070000000100000000fb6c7a2ce29a"], 0x305) [ 2706.211491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2706.231940] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2706.263845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2706.278403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2706.300914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2706.320779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2706.361550] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2706.367597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2706.395897] 8021q: adding VLAN 0 to HW filter on device bond0 04:05:28 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2706.411503] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2706.451164] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 04:05:29 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2706.459910] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 04:05:29 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2706.522226] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2706.538290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2706.561259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2706.586948] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2706.617082] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2706.624306] 8021q: adding VLAN 0 to HW filter on device team0 [ 2706.634376] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2706.649960] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2706.664753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2706.673804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:05:29 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2706.681893] bridge0: port 1(bridge_slave_0) entered blocking state [ 2706.688242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2706.721563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2706.765479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2706.806179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2706.827664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2706.865610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2706.873403] bridge0: port 2(bridge_slave_1) entered blocking state [ 2706.879747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2706.886739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2707.157670] bridge0: port 2(bridge_slave_1) entered disabled state [ 2707.166707] bridge0: port 1(bridge_slave_0) entered disabled state [ 2707.624367] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2707.636607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2707.654283] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2707.670687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2707.678344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2707.699883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2707.712134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2707.719089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2707.727585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2707.737167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2707.753376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2707.761376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2707.772000] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2707.779961] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2707.798884] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2707.808696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2707.829736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2707.842584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2708.079357] bridge0: port 2(bridge_slave_1) entered disabled state [ 2708.087611] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:30 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:05:30 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2708.397230] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2708.415708] 8021q: adding VLAN 0 to HW filter on device batadv0 04:05:31 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:05:31 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2709.687435] bridge0: port 2(bridge_slave_1) entered disabled state [ 2709.695204] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:32 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd07"}, 0x3d) 04:05:32 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd07"}, 0x3d) 04:05:32 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd07"}, 0x3d) [ 2710.406961] device bridge_slave_1 left promiscuous mode [ 2710.412951] bridge0: port 2(bridge_slave_1) entered disabled state [ 2710.460837] device bridge_slave_0 left promiscuous mode [ 2710.471691] bridge0: port 1(bridge_slave_0) entered disabled state [ 2710.541323] device bridge_slave_1 left promiscuous mode [ 2710.546835] bridge0: port 2(bridge_slave_1) entered disabled state [ 2710.591155] device bridge_slave_0 left promiscuous mode [ 2710.600913] bridge0: port 1(bridge_slave_0) entered disabled state [ 2710.661142] device bridge_slave_1 left promiscuous mode [ 2710.666588] bridge0: port 2(bridge_slave_1) entered disabled state [ 2710.711183] device bridge_slave_0 left promiscuous mode [ 2710.716705] bridge0: port 1(bridge_slave_0) entered disabled state [ 2710.771606] device bridge_slave_1 left promiscuous mode [ 2710.777066] bridge0: port 2(bridge_slave_1) entered disabled state [ 2710.831001] device bridge_slave_0 left promiscuous mode [ 2710.836508] bridge0: port 1(bridge_slave_0) entered disabled state [ 2710.891642] device bridge_slave_1 left promiscuous mode [ 2710.897110] bridge0: port 2(bridge_slave_1) entered disabled state [ 2710.951086] device bridge_slave_0 left promiscuous mode [ 2710.956592] bridge0: port 1(bridge_slave_0) entered disabled state [ 2711.031758] device bridge_slave_1 left promiscuous mode [ 2711.037251] bridge0: port 2(bridge_slave_1) entered disabled state [ 2711.100870] device bridge_slave_0 left promiscuous mode [ 2711.106328] bridge0: port 1(bridge_slave_0) entered disabled state [ 2711.221543] device hsr_slave_1 left promiscuous mode [ 2711.273688] device hsr_slave_0 left promiscuous mode [ 2711.316542] team0 (unregistering): Port device team_slave_1 removed [ 2711.325463] team0 (unregistering): Port device team_slave_0 removed [ 2711.335532] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2711.363187] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2711.424050] bond0 (unregistering): Released all slaves [ 2711.521763] device hsr_slave_1 left promiscuous mode [ 2711.562427] device hsr_slave_0 left promiscuous mode [ 2711.622727] team0 (unregistering): Port device team_slave_1 removed [ 2711.634534] team0 (unregistering): Port device team_slave_0 removed [ 2711.644948] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2711.674763] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2711.753268] bond0 (unregistering): Released all slaves [ 2711.842515] device hsr_slave_1 left promiscuous mode [ 2711.883890] device hsr_slave_0 left promiscuous mode [ 2711.925406] team0 (unregistering): Port device team_slave_1 removed [ 2711.935193] team0 (unregistering): Port device team_slave_0 removed [ 2711.945163] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2711.974072] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2712.032869] bond0 (unregistering): Released all slaves [ 2712.121618] device hsr_slave_1 left promiscuous mode [ 2712.162563] device hsr_slave_0 left promiscuous mode [ 2712.214038] team0 (unregistering): Port device team_slave_1 removed [ 2712.223475] team0 (unregistering): Port device team_slave_0 removed [ 2712.233383] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2712.303431] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2712.381430] bond0 (unregistering): Released all slaves [ 2712.482643] device hsr_slave_1 left promiscuous mode [ 2712.523721] device hsr_slave_0 left promiscuous mode [ 2712.564143] team0 (unregistering): Port device team_slave_1 removed [ 2712.575008] team0 (unregistering): Port device team_slave_0 removed [ 2712.586322] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2712.614343] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2712.697201] bond0 (unregistering): Released all slaves [ 2712.802327] device hsr_slave_1 left promiscuous mode [ 2712.843936] device hsr_slave_0 left promiscuous mode [ 2712.883939] team0 (unregistering): Port device team_slave_1 removed [ 2712.893296] team0 (unregistering): Port device team_slave_0 removed [ 2712.903267] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2712.945337] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2713.034039] bond0 (unregistering): Released all slaves [ 2718.541308] IPVS: ftp: loaded support on port[0] = 21 [ 2719.461351] chnl_net:caif_netlink_parms(): no params data found [ 2719.461939] IPVS: ftp: loaded support on port[0] = 21 [ 2719.530459] IPVS: ftp: loaded support on port[0] = 21 [ 2719.536005] bridge0: port 1(bridge_slave_0) entered blocking state [ 2719.544347] bridge0: port 1(bridge_slave_0) entered disabled state [ 2719.551250] device bridge_slave_0 entered promiscuous mode [ 2719.557734] bridge0: port 2(bridge_slave_1) entered blocking state [ 2719.564450] bridge0: port 2(bridge_slave_1) entered disabled state [ 2719.571413] device bridge_slave_1 entered promiscuous mode [ 2719.593139] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2719.602168] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2719.622411] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2719.629463] team0: Port device team_slave_0 added [ 2719.641306] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2719.648308] team0: Port device team_slave_1 added [ 2719.656079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2719.671442] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2719.783424] device hsr_slave_0 entered promiscuous mode [ 2719.820429] device hsr_slave_1 entered promiscuous mode [ 2719.863379] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2719.870799] chnl_net:caif_netlink_parms(): no params data found [ 2719.879364] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2719.899476] IPVS: ftp: loaded support on port[0] = 21 [ 2719.932127] bridge0: port 2(bridge_slave_1) entered blocking state [ 2719.938484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2719.945159] bridge0: port 1(bridge_slave_0) entered blocking state [ 2719.951543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2719.982992] bridge0: port 1(bridge_slave_0) entered blocking state [ 2719.989403] bridge0: port 1(bridge_slave_0) entered disabled state [ 2719.996486] device bridge_slave_0 entered promiscuous mode [ 2720.050260] chnl_net:caif_netlink_parms(): no params data found [ 2720.062279] bridge0: port 2(bridge_slave_1) entered blocking state [ 2720.068722] bridge0: port 2(bridge_slave_1) entered disabled state [ 2720.076398] device bridge_slave_1 entered promiscuous mode [ 2720.101333] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2720.110438] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2720.131551] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2720.138607] team0: Port device team_slave_0 added [ 2720.144282] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2720.151551] team0: Port device team_slave_1 added [ 2720.174704] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2720.193571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2720.213006] IPVS: ftp: loaded support on port[0] = 21 [ 2720.222464] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2720.228530] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2720.249913] bridge0: port 1(bridge_slave_0) entered blocking state [ 2720.256696] bridge0: port 1(bridge_slave_0) entered disabled state [ 2720.263934] device bridge_slave_0 entered promiscuous mode [ 2720.272722] bridge0: port 2(bridge_slave_1) entered blocking state [ 2720.279048] bridge0: port 2(bridge_slave_1) entered disabled state [ 2720.286037] device bridge_slave_1 entered promiscuous mode [ 2720.310008] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2720.326436] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2720.372302] device hsr_slave_0 entered promiscuous mode [ 2720.410339] device hsr_slave_1 entered promiscuous mode [ 2720.461021] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2720.468647] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2720.493994] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2720.501359] bridge0: port 1(bridge_slave_0) entered disabled state [ 2720.507907] bridge0: port 2(bridge_slave_1) entered disabled state [ 2720.517841] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2720.570890] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2720.577232] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2720.584388] team0: Port device team_slave_0 added [ 2720.589949] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2720.597769] team0: Port device team_slave_1 added [ 2720.610630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2720.617430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2720.627742] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2720.636835] 8021q: adding VLAN 0 to HW filter on device team0 [ 2720.643208] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2720.650976] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2720.662805] chnl_net:caif_netlink_parms(): no params data found [ 2720.688651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2720.744016] device hsr_slave_0 entered promiscuous mode [ 2720.780658] device hsr_slave_1 entered promiscuous mode [ 2720.820419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2720.828170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2720.835786] bridge0: port 1(bridge_slave_0) entered blocking state [ 2720.842163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2720.850950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2720.858649] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2720.873273] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2720.873482] IPVS: ftp: loaded support on port[0] = 21 [ 2720.895767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2720.903782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2720.911487] bridge0: port 2(bridge_slave_1) entered blocking state [ 2720.917817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2720.929829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2720.937743] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2720.953907] bridge0: port 1(bridge_slave_0) entered blocking state [ 2720.960767] bridge0: port 1(bridge_slave_0) entered disabled state [ 2720.967622] device bridge_slave_0 entered promiscuous mode [ 2720.974498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2720.989079] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2721.003672] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2721.011447] bridge0: port 2(bridge_slave_1) entered blocking state [ 2721.017809] bridge0: port 2(bridge_slave_1) entered disabled state [ 2721.025445] device bridge_slave_1 entered promiscuous mode [ 2721.039414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2721.047284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2721.054797] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2721.139744] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2721.148064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2721.162885] chnl_net:caif_netlink_parms(): no params data found [ 2721.173255] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2721.181261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2721.188787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2721.200717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2721.220692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2721.233897] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2721.245848] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2721.260685] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2721.268084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2721.276413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2721.299521] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2721.307252] team0: Port device team_slave_0 added [ 2721.313436] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2721.319735] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2721.326918] team0: Port device team_slave_1 added [ 2721.332303] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2721.339821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2721.374042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2721.382289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2721.389109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2721.396286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2721.403831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2721.462468] device hsr_slave_0 entered promiscuous mode [ 2721.500345] device hsr_slave_1 entered promiscuous mode [ 2721.549608] bridge0: port 1(bridge_slave_0) entered blocking state [ 2721.556113] bridge0: port 1(bridge_slave_0) entered disabled state [ 2721.563405] device bridge_slave_0 entered promiscuous mode [ 2721.569986] bridge0: port 2(bridge_slave_1) entered blocking state [ 2721.576585] bridge0: port 2(bridge_slave_1) entered disabled state [ 2721.584229] device bridge_slave_1 entered promiscuous mode [ 2721.592145] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2721.598210] 8021q: adding VLAN 0 to HW filter on device team0 [ 2721.606368] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2721.613639] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2721.628696] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2721.666875] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2721.683913] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2721.696849] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2721.720267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2721.727967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2721.736508] bridge0: port 1(bridge_slave_0) entered blocking state [ 2721.742873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2721.749914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2721.758302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2721.795859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2721.808917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2721.816606] bridge0: port 2(bridge_slave_1) entered blocking state [ 2721.823001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2721.836799] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2721.847045] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2721.856104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2721.899010] chnl_net:caif_netlink_parms(): no params data found [ 2721.913769] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2721.925790] team0: Port device team_slave_0 added [ 2721.931839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2721.957362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2721.981415] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2721.988431] team0: Port device team_slave_1 added [ 2721.998255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2722.014943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2722.028117] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2722.041623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2722.049288] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2722.057245] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2722.066328] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2722.082476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2722.089714] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2722.107255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2722.113824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2722.126331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2722.139329] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2722.147702] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2722.177379] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2722.191084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2722.198665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2722.208196] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2722.357503] bridge0: port 2(bridge_slave_1) entered disabled state [ 2722.366206] bridge0: port 1(bridge_slave_0) entered disabled state [ 2722.586699] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2722.644087] device hsr_slave_0 entered promiscuous mode [ 2722.700530] device hsr_slave_1 entered promiscuous mode [ 2722.751006] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2722.758002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2722.765966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2722.773460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2722.780351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2722.788576] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 04:05:45 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00040000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2722.795043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2722.808346] bridge0: port 1(bridge_slave_0) entered blocking state [ 2722.814823] bridge0: port 1(bridge_slave_0) entered disabled state [ 2722.822007] device bridge_slave_0 entered promiscuous mode [ 2722.830439] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2722.836515] 8021q: adding VLAN 0 to HW filter on device team0 [ 2722.848701] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2722.855496] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2722.862645] bridge0: port 2(bridge_slave_1) entered blocking state [ 2722.868980] bridge0: port 2(bridge_slave_1) entered disabled state [ 2722.876497] device bridge_slave_1 entered promiscuous mode [ 2722.889689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2722.896673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2722.914228] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2722.921701] 8021q: adding VLAN 0 to HW filter on device team0 [ 2722.929663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2722.946182] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2722.955372] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2722.965626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2722.973814] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2722.981504] bridge0: port 1(bridge_slave_0) entered blocking state [ 2722.987936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2722.997464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2723.011367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2723.029107] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2723.037483] team0: Port device team_slave_0 added [ 2723.042578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2723.049529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2723.058042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2723.065619] bridge0: port 2(bridge_slave_1) entered blocking state [ 2723.071984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2723.078923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2723.086679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2723.094292] bridge0: port 1(bridge_slave_0) entered blocking state [ 2723.100666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2723.107549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2723.121420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2723.129969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2723.141446] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2723.149560] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2723.156983] team0: Port device team_slave_1 added [ 2723.162430] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2723.169580] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2723.180582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2723.189478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 04:05:45 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c00070008000100000000000800040000000000080002000000000008000300000000000800020000f2ff0008000200000000000800020000000080"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2723.199516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2723.209288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2723.232536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2723.240629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2723.248176] bridge0: port 2(bridge_slave_1) entered blocking state [ 2723.254558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2723.262670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2723.270568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2723.279737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2723.291198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 04:05:45 executing program 0: [ 2723.302129] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2723.311063] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2723.364005] device hsr_slave_0 entered promiscuous mode [ 2723.412035] device hsr_slave_1 entered promiscuous mode [ 2723.452620] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2723.469547] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2723.479531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2723.500508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2723.509961] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2723.529501] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2723.549198] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2723.557724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2723.572387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2723.596963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2723.615181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2723.631195] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2723.650841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2723.659500] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2723.707335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2723.734249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2723.750488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2723.757950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2723.772305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2723.779744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2723.794474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2723.804792] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2723.820166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2723.855599] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2723.876834] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2723.918572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2723.926728] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2723.935576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2723.943353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2723.956650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2723.965631] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2723.983023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2723.991546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2724.001036] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2724.007292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2724.016068] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2724.025515] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2724.032226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2724.039111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2724.054814] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2724.063491] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2724.069555] 8021q: adding VLAN 0 to HW filter on device team0 [ 2724.091482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2724.108955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2724.117349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2724.125110] bridge0: port 1(bridge_slave_0) entered blocking state [ 2724.131480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2724.138572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2724.148781] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2724.159721] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2724.176801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2724.189698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2724.198049] bridge0: port 2(bridge_slave_1) entered blocking state [ 2724.204438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2724.230950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2724.259290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2724.268097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2724.283658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2724.292043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2724.452910] bridge0: port 2(bridge_slave_1) entered disabled state [ 2724.461678] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:47 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:05:47 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2724.713039] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2724.724028] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2724.732013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2724.739778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2724.749699] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2724.759495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2724.776804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2724.785193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2724.795575] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2724.836167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2724.850865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2724.867286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2724.895644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2724.905448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2724.948466] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2724.967901] 8021q: adding VLAN 0 to HW filter on device team0 [ 2724.998542] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2725.278650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2725.288092] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:48 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:05:48 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2725.667395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2725.686384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2725.710762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 04:05:48 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2725.725826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2725.737835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2725.754501] bridge0: port 1(bridge_slave_0) entered blocking state [ 2725.760911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2725.778936] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2725.788810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2725.812261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2725.831144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2725.838241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2725.866582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2725.886694] bridge0: port 2(bridge_slave_1) entered blocking state [ 2725.893110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2725.918965] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2725.944419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2725.967389] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2725.987768] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2725.997997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2726.046452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2726.065802] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2726.082120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2726.093342] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2726.101900] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2726.120205] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2726.137274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2726.144231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2726.161376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2726.169086] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2726.183803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2726.204967] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2726.223958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2726.245894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2726.265956] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2726.272516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2726.312847] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2726.559910] bridge0: port 2(bridge_slave_1) entered disabled state [ 2726.567953] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:49 executing program 2: 04:05:49 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2726.876907] 8021q: adding VLAN 0 to HW filter on device batadv0 04:05:49 executing program 2: [ 2728.050728] device bridge_slave_1 left promiscuous mode [ 2728.056264] bridge0: port 2(bridge_slave_1) entered disabled state [ 2728.110721] device bridge_slave_0 left promiscuous mode [ 2728.116275] bridge0: port 1(bridge_slave_0) entered disabled state [ 2728.162081] device bridge_slave_1 left promiscuous mode [ 2728.167538] bridge0: port 2(bridge_slave_1) entered disabled state [ 2728.240690] device bridge_slave_0 left promiscuous mode [ 2728.246207] bridge0: port 1(bridge_slave_0) entered disabled state [ 2728.301196] device bridge_slave_1 left promiscuous mode [ 2728.306709] bridge0: port 2(bridge_slave_1) entered disabled state [ 2728.350944] device bridge_slave_0 left promiscuous mode [ 2728.356550] bridge0: port 1(bridge_slave_0) entered disabled state [ 2728.401487] device bridge_slave_1 left promiscuous mode [ 2728.407001] bridge0: port 2(bridge_slave_1) entered disabled state [ 2728.460890] device bridge_slave_0 left promiscuous mode [ 2728.466369] bridge0: port 1(bridge_slave_0) entered disabled state [ 2728.521743] device bridge_slave_1 left promiscuous mode [ 2728.527327] bridge0: port 2(bridge_slave_1) entered disabled state [ 2728.572296] device bridge_slave_0 left promiscuous mode [ 2728.577854] bridge0: port 1(bridge_slave_0) entered disabled state [ 2728.712745] device hsr_slave_1 left promiscuous mode [ 2728.754397] device hsr_slave_0 left promiscuous mode [ 2728.814585] team0 (unregistering): Port device team_slave_1 removed [ 2728.824336] team0 (unregistering): Port device team_slave_0 removed [ 2728.834746] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2728.865469] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2728.924471] bond0 (unregistering): Released all slaves [ 2729.041810] device hsr_slave_1 left promiscuous mode [ 2729.114159] device hsr_slave_0 left promiscuous mode [ 2729.152807] team0 (unregistering): Port device team_slave_1 removed [ 2729.163516] team0 (unregistering): Port device team_slave_0 removed [ 2729.172342] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2729.215500] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2729.284037] bond0 (unregistering): Released all slaves [ 2729.351900] device hsr_slave_1 left promiscuous mode [ 2729.412611] device hsr_slave_0 left promiscuous mode [ 2729.452636] team0 (unregistering): Port device team_slave_1 removed [ 2729.463722] team0 (unregistering): Port device team_slave_0 removed [ 2729.473231] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2729.532933] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2729.606316] bond0 (unregistering): Released all slaves [ 2729.672053] device hsr_slave_1 left promiscuous mode [ 2729.712804] device hsr_slave_0 left promiscuous mode [ 2729.753284] team0 (unregistering): Port device team_slave_1 removed [ 2729.764996] team0 (unregistering): Port device team_slave_0 removed [ 2729.774525] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2729.812931] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2729.893792] bond0 (unregistering): Released all slaves [ 2729.972642] device hsr_slave_1 left promiscuous mode [ 2730.022779] device hsr_slave_0 left promiscuous mode [ 2730.083047] team0 (unregistering): Port device team_slave_1 removed [ 2730.094584] team0 (unregistering): Port device team_slave_0 removed [ 2730.103706] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2730.133634] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2730.203354] bond0 (unregistering): Released all slaves 04:05:52 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd0700000001000000"}, 0x44) 04:05:52 executing program 2: [ 2730.266246] bridge0: port 2(bridge_slave_1) entered disabled state [ 2730.272805] bridge0: port 1(bridge_slave_0) entered disabled state 04:05:52 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd0700000001000000"}, 0x44) [ 2735.000820] IPVS: ftp: loaded support on port[0] = 21 [ 2735.992172] IPVS: ftp: loaded support on port[0] = 21 [ 2736.001935] chnl_net:caif_netlink_parms(): no params data found [ 2736.057324] bridge0: port 1(bridge_slave_0) entered blocking state [ 2736.063957] bridge0: port 1(bridge_slave_0) entered disabled state [ 2736.071233] device bridge_slave_0 entered promiscuous mode [ 2736.079632] bridge0: port 2(bridge_slave_1) entered blocking state [ 2736.086058] bridge0: port 2(bridge_slave_1) entered disabled state [ 2736.092960] device bridge_slave_1 entered promiscuous mode [ 2736.106930] IPVS: ftp: loaded support on port[0] = 21 [ 2736.128446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2736.146396] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2736.176457] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2736.183562] team0: Port device team_slave_0 added [ 2736.194288] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2736.201529] team0: Port device team_slave_1 added [ 2736.208914] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2736.218198] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2736.314059] device hsr_slave_0 entered promiscuous mode [ 2736.352837] device hsr_slave_1 entered promiscuous mode [ 2736.415630] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2736.425158] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2736.435724] chnl_net:caif_netlink_parms(): no params data found [ 2736.463362] IPVS: ftp: loaded support on port[0] = 21 [ 2736.526039] chnl_net:caif_netlink_parms(): no params data found [ 2736.569456] bridge0: port 2(bridge_slave_1) entered blocking state [ 2736.575950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2736.582580] bridge0: port 1(bridge_slave_0) entered blocking state [ 2736.588926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2736.596789] bridge0: port 1(bridge_slave_0) entered blocking state [ 2736.603189] bridge0: port 1(bridge_slave_0) entered disabled state [ 2736.610127] device bridge_slave_0 entered promiscuous mode [ 2736.619141] bridge0: port 2(bridge_slave_1) entered blocking state [ 2736.625570] bridge0: port 2(bridge_slave_1) entered disabled state [ 2736.632735] device bridge_slave_1 entered promiscuous mode [ 2736.661531] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2736.677094] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2736.698271] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2736.705848] team0: Port device team_slave_0 added [ 2736.721891] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2736.728986] team0: Port device team_slave_1 added [ 2736.736560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2736.751174] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2736.758170] bridge0: port 1(bridge_slave_0) entered blocking state [ 2736.768007] bridge0: port 1(bridge_slave_0) entered disabled state [ 2736.774888] device bridge_slave_0 entered promiscuous mode [ 2736.796544] IPVS: ftp: loaded support on port[0] = 21 [ 2736.805425] bridge0: port 2(bridge_slave_1) entered blocking state [ 2736.812367] bridge0: port 2(bridge_slave_1) entered disabled state [ 2736.819339] device bridge_slave_1 entered promiscuous mode [ 2736.884106] device hsr_slave_0 entered promiscuous mode [ 2736.930538] device hsr_slave_1 entered promiscuous mode [ 2736.983123] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2736.999992] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2737.009095] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2737.017788] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2737.045683] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2737.052959] team0: Port device team_slave_0 added [ 2737.058357] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2737.065537] team0: Port device team_slave_1 added [ 2737.073769] bridge0: port 1(bridge_slave_0) entered disabled state [ 2737.080539] bridge0: port 2(bridge_slave_1) entered disabled state [ 2737.124730] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2737.133031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2737.244147] device hsr_slave_0 entered promiscuous mode [ 2737.280493] device hsr_slave_1 entered promiscuous mode [ 2737.321985] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2737.335089] chnl_net:caif_netlink_parms(): no params data found [ 2737.346500] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2737.355619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2737.408993] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2737.427511] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2737.504468] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2737.543424] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2737.555865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2737.562789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2737.569646] bridge0: port 1(bridge_slave_0) entered blocking state [ 2737.581757] bridge0: port 1(bridge_slave_0) entered disabled state [ 2737.588724] device bridge_slave_0 entered promiscuous mode [ 2737.602068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2737.609663] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2737.617478] 8021q: adding VLAN 0 to HW filter on device team0 [ 2737.634622] bridge0: port 2(bridge_slave_1) entered blocking state [ 2737.641151] bridge0: port 2(bridge_slave_1) entered disabled state [ 2737.648094] device bridge_slave_1 entered promiscuous mode [ 2737.665277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2737.673175] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2737.679362] chnl_net:caif_netlink_parms(): no params data found [ 2737.706478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2737.714418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2737.722033] bridge0: port 1(bridge_slave_0) entered blocking state [ 2737.728482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2737.737438] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2737.747673] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2737.763053] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2737.769403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2737.777679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2737.785522] bridge0: port 2(bridge_slave_1) entered blocking state [ 2737.792008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2737.798831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2737.805748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2737.815093] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2737.831514] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2737.857302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2737.875654] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2737.882605] 8021q: adding VLAN 0 to HW filter on device team0 [ 2737.889105] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2737.896937] team0: Port device team_slave_0 added [ 2737.907180] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2737.914305] bridge0: port 1(bridge_slave_0) entered blocking state [ 2737.924796] bridge0: port 1(bridge_slave_0) entered disabled state [ 2737.931732] device bridge_slave_0 entered promiscuous mode [ 2737.938525] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2737.945743] team0: Port device team_slave_1 added [ 2737.962427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2737.971978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2737.980768] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2737.988223] bridge0: port 2(bridge_slave_1) entered blocking state [ 2737.995403] bridge0: port 2(bridge_slave_1) entered disabled state [ 2738.002620] device bridge_slave_1 entered promiscuous mode [ 2738.021823] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2738.029779] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2738.037725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2738.045396] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2738.053058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2738.060718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2738.068282] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2738.077417] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2738.090878] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2738.098942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2738.114677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2738.122832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2738.130420] bridge0: port 1(bridge_slave_0) entered blocking state [ 2738.136748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2738.144841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2738.153188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2738.190638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2738.197665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2738.205260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2738.212869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2738.220936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2738.228419] bridge0: port 2(bridge_slave_1) entered blocking state [ 2738.234790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2738.244599] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2738.294198] device hsr_slave_0 entered promiscuous mode [ 2738.330586] device hsr_slave_1 entered promiscuous mode [ 2738.370741] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2738.377814] team0: Port device team_slave_0 added [ 2738.387957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2738.394789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2738.402664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2738.411254] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2738.418364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2738.426557] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2738.433819] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2738.442479] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2738.455042] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2738.461467] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2738.468465] team0: Port device team_slave_1 added [ 2738.475259] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2738.481519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2738.490232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2738.498847] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2738.508472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2738.516143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2738.523272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2738.531243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2738.538761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2738.546652] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2738.560252] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2738.567712] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2738.579438] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2738.591861] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2738.607494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2738.620688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2738.628208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2738.635804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2738.646497] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2738.652841] 8021q: adding VLAN 0 to HW filter on device team0 [ 2738.712562] device hsr_slave_0 entered promiscuous mode [ 2738.750400] device hsr_slave_1 entered promiscuous mode [ 2738.811212] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2738.820975] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2738.831225] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2738.838144] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2738.846675] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2738.861864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2738.869480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2738.877410] bridge0: port 1(bridge_slave_0) entered blocking state [ 2738.883759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2738.891430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2738.898806] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2738.909381] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2738.917945] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2738.924078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2738.935251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2738.944436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2738.952161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2738.959800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2738.967478] bridge0: port 2(bridge_slave_1) entered blocking state [ 2738.973872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2738.987228] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2739.017545] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2739.025831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2739.035560] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2739.046362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2739.058644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2739.070940] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2739.078175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2739.095935] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2739.115323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2739.123896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2739.134569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2739.153723] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2739.162133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2739.169788] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2739.185582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2739.194449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2739.206529] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 04:06:01 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendto$inet(r1, 0x0, 0x78, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0xfffffffffffffe79, 0x1, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000400)) 04:06:01 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd0700000001000000"}, 0x44) [ 2739.219996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2739.228285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2739.238493] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2739.247249] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2739.259036] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2739.298816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2739.312917] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2739.319970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2739.333242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2739.354066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2739.375726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2739.675945] bridge0: port 2(bridge_slave_1) entered disabled state [ 2739.685177] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:02 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c1}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) wait4(0x0, 0x0, 0x0, 0x0) [ 2740.107263] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2740.114062] 8021q: adding VLAN 0 to HW filter on device team0 [ 2740.135564] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2740.156662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2740.178607] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2740.193356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2740.209577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 04:06:02 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2740.222533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2740.240283] bridge0: port 1(bridge_slave_0) entered blocking state [ 2740.246641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2740.255583] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2740.264251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2740.281170] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2740.288281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2740.310890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2740.318512] bridge0: port 2(bridge_slave_1) entered blocking state [ 2740.324907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2740.365079] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2740.381794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2740.392766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2740.399653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2740.406990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2740.414221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2740.426405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2740.436467] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2740.448162] 8021q: adding VLAN 0 to HW filter on device team0 [ 2740.466237] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2740.483776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2740.501480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 04:06:03 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:03 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2740.518285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2740.547475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2740.588326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2740.596192] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2740.627253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2740.657299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2740.665024] bridge0: port 1(bridge_slave_0) entered blocking state [ 2740.671417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2740.685562] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2740.693773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2740.708392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2740.720164] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2740.734774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2740.754274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2740.786893] bridge0: port 2(bridge_slave_1) entered blocking state [ 2740.793323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2740.820484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2740.828093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2740.852702] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2740.862423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2740.874672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2740.889110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2740.901083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2740.921376] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2740.927449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2740.947709] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2740.987281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2741.020328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2741.035427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2741.060814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2741.079304] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2741.103921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2741.145807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2741.160916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2741.171642] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2741.194318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2741.203052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2741.220910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2741.231075] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2741.238943] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2741.248625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2741.260358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2741.269650] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2741.276065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2741.294558] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2741.305463] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2742.123959] bridge0: port 2(bridge_slave_1) entered disabled state [ 2742.131927] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:05 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:05 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:05 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:05 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2742.787007] bridge0: port 2(bridge_slave_1) entered disabled state [ 2742.795789] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:05 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 04:06:05 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2743.337687] bridge0: port 2(bridge_slave_1) entered disabled state [ 2743.344498] bridge0: port 1(bridge_slave_0) entered disabled state [ 2744.040454] device bridge_slave_1 left promiscuous mode [ 2744.045920] bridge0: port 2(bridge_slave_1) entered disabled state [ 2744.100926] device bridge_slave_0 left promiscuous mode [ 2744.106436] bridge0: port 1(bridge_slave_0) entered disabled state [ 2744.151236] device bridge_slave_1 left promiscuous mode [ 2744.156672] bridge0: port 2(bridge_slave_1) entered disabled state [ 2744.210610] device bridge_slave_0 left promiscuous mode [ 2744.216049] bridge0: port 1(bridge_slave_0) entered disabled state [ 2744.261975] device bridge_slave_1 left promiscuous mode [ 2744.267511] bridge0: port 2(bridge_slave_1) entered disabled state [ 2744.311123] device bridge_slave_0 left promiscuous mode [ 2744.316565] bridge0: port 1(bridge_slave_0) entered disabled state [ 2744.361698] device bridge_slave_1 left promiscuous mode [ 2744.367177] bridge0: port 2(bridge_slave_1) entered disabled state [ 2744.410940] device bridge_slave_0 left promiscuous mode [ 2744.416433] bridge0: port 1(bridge_slave_0) entered disabled state [ 2744.481584] device bridge_slave_1 left promiscuous mode [ 2744.487103] bridge0: port 2(bridge_slave_1) entered disabled state [ 2744.520755] device bridge_slave_0 left promiscuous mode [ 2744.526195] bridge0: port 1(bridge_slave_0) entered disabled state [ 2744.601122] device bridge_slave_1 left promiscuous mode [ 2744.606568] bridge0: port 2(bridge_slave_1) entered disabled state [ 2744.671147] device bridge_slave_0 left promiscuous mode [ 2744.676659] bridge0: port 1(bridge_slave_0) entered disabled state [ 2744.803573] device hsr_slave_1 left promiscuous mode [ 2744.853799] device hsr_slave_0 left promiscuous mode [ 2744.894165] team0 (unregistering): Port device team_slave_1 removed [ 2744.903560] team0 (unregistering): Port device team_slave_0 removed [ 2744.913540] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2744.963306] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2745.043101] bond0 (unregistering): Released all slaves [ 2745.142277] device hsr_slave_1 left promiscuous mode [ 2745.192697] device hsr_slave_0 left promiscuous mode [ 2745.243634] team0 (unregistering): Port device team_slave_1 removed [ 2745.254204] team0 (unregistering): Port device team_slave_0 removed [ 2745.264363] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2745.306472] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2745.384387] bond0 (unregistering): Released all slaves [ 2745.462603] device hsr_slave_1 left promiscuous mode [ 2745.503922] device hsr_slave_0 left promiscuous mode [ 2745.544947] team0 (unregistering): Port device team_slave_1 removed [ 2745.555256] team0 (unregistering): Port device team_slave_0 removed [ 2745.565588] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2745.612895] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2745.683581] bond0 (unregistering): Released all slaves [ 2745.802644] device hsr_slave_1 left promiscuous mode [ 2745.843506] device hsr_slave_0 left promiscuous mode [ 2745.883656] team0 (unregistering): Port device team_slave_1 removed [ 2745.893062] team0 (unregistering): Port device team_slave_0 removed [ 2745.902767] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2745.933427] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2746.005246] bond0 (unregistering): Released all slaves [ 2746.111730] device hsr_slave_1 left promiscuous mode [ 2746.152658] device hsr_slave_0 left promiscuous mode [ 2746.192868] team0 (unregistering): Port device team_slave_1 removed [ 2746.202945] team0 (unregistering): Port device team_slave_0 removed [ 2746.212121] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2746.264880] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2746.343640] bond0 (unregistering): Released all slaves [ 2746.421878] device hsr_slave_1 left promiscuous mode [ 2746.462650] device hsr_slave_0 left promiscuous mode [ 2746.514043] team0 (unregistering): Port device team_slave_1 removed [ 2746.524548] team0 (unregistering): Port device team_slave_0 removed [ 2746.533324] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2746.594291] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2746.655427] bond0 (unregistering): Released all slaves [ 2752.071261] IPVS: ftp: loaded support on port[0] = 21 [ 2752.982249] IPVS: ftp: loaded support on port[0] = 21 [ 2752.982293] chnl_net:caif_netlink_parms(): no params data found [ 2753.045475] bridge0: port 1(bridge_slave_0) entered blocking state [ 2753.051902] bridge0: port 1(bridge_slave_0) entered disabled state [ 2753.058676] device bridge_slave_0 entered promiscuous mode [ 2753.065691] bridge0: port 2(bridge_slave_1) entered blocking state [ 2753.072101] bridge0: port 2(bridge_slave_1) entered disabled state [ 2753.078983] device bridge_slave_1 entered promiscuous mode [ 2753.089557] IPVS: ftp: loaded support on port[0] = 21 [ 2753.112157] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2753.125177] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2753.152136] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2753.159166] team0: Port device team_slave_0 added [ 2753.164837] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2753.172156] team0: Port device team_slave_1 added [ 2753.192445] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2753.217275] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2753.302243] device hsr_slave_0 entered promiscuous mode [ 2753.340291] device hsr_slave_1 entered promiscuous mode [ 2753.403004] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2753.409739] chnl_net:caif_netlink_parms(): no params data found [ 2753.432068] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2753.480541] bridge0: port 1(bridge_slave_0) entered blocking state [ 2753.486951] bridge0: port 1(bridge_slave_0) entered disabled state [ 2753.494222] device bridge_slave_0 entered promiscuous mode [ 2753.501954] bridge0: port 2(bridge_slave_1) entered blocking state [ 2753.508387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2753.514995] bridge0: port 1(bridge_slave_0) entered blocking state [ 2753.521370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2753.529795] bridge0: port 2(bridge_slave_1) entered blocking state [ 2753.536245] bridge0: port 2(bridge_slave_1) entered disabled state [ 2753.543504] device bridge_slave_1 entered promiscuous mode [ 2753.619272] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2753.626196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2753.633446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2753.659275] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2753.689019] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2753.698881] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2753.707966] team0: Port device team_slave_0 added [ 2753.714587] chnl_net:caif_netlink_parms(): no params data found [ 2753.729289] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2753.738253] team0: Port device team_slave_1 added [ 2753.753139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2753.763186] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2753.772427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2753.779645] bridge0: port 1(bridge_slave_0) entered disabled state [ 2753.787798] bridge0: port 2(bridge_slave_1) entered disabled state [ 2753.798912] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2753.807949] 8021q: adding VLAN 0 to HW filter on device team0 [ 2753.893858] device hsr_slave_0 entered promiscuous mode [ 2753.950508] device hsr_slave_1 entered promiscuous mode [ 2754.004915] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2754.011954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2754.019425] bridge0: port 1(bridge_slave_0) entered blocking state [ 2754.025790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2754.032785] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2754.039811] bridge0: port 1(bridge_slave_0) entered blocking state [ 2754.046594] bridge0: port 1(bridge_slave_0) entered disabled state [ 2754.053437] device bridge_slave_0 entered promiscuous mode [ 2754.063530] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2754.074446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2754.082113] bridge0: port 2(bridge_slave_1) entered blocking state [ 2754.088437] bridge0: port 2(bridge_slave_1) entered disabled state [ 2754.095957] device bridge_slave_1 entered promiscuous mode [ 2754.102435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2754.110160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2754.117643] bridge0: port 2(bridge_slave_1) entered blocking state [ 2754.124041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2754.146519] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2754.155795] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2754.163626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2754.175440] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2754.195396] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2754.207711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2754.218279] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2754.226194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2754.234466] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2754.241667] team0: Port device team_slave_0 added [ 2754.253787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2754.261503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2754.269171] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2754.276643] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2754.283841] team0: Port device team_slave_1 added [ 2754.289824] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2754.299857] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2754.308365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2754.318767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2754.333632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2754.341299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2754.348647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2754.356350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2754.380836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2754.387741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2754.397397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2754.442169] device hsr_slave_0 entered promiscuous mode [ 2754.480316] device hsr_slave_1 entered promiscuous mode [ 2754.520682] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2754.527820] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2754.538881] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2754.545032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2754.569058] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2754.576849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2754.585707] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2754.594807] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2754.612089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2754.621440] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2754.628282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2754.635197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2754.649066] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2754.655578] 8021q: adding VLAN 0 to HW filter on device team0 [ 2754.664245] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2754.677808] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2754.684694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2754.693419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2754.701496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2754.709089] bridge0: port 1(bridge_slave_0) entered blocking state [ 2754.715482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2754.722529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2754.731732] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2754.740657] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2754.748847] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2754.761877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2754.769608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2754.777407] bridge0: port 2(bridge_slave_1) entered blocking state [ 2754.783818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2754.791466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2754.798513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2754.811903] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2754.817977] 8021q: adding VLAN 0 to HW filter on device team0 [ 2754.826530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2754.837387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2754.846749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2754.856319] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2754.864115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2754.872260] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2754.879763] bridge0: port 1(bridge_slave_0) entered blocking state [ 2754.886125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2754.893750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2754.901877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2754.909398] bridge0: port 2(bridge_slave_1) entered blocking state [ 2754.915770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2754.923089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2754.947929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2754.956347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2754.965687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2754.973873] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2754.989495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2754.997453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2755.005027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2755.012710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2755.020555] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2755.027599] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2755.155086] bridge0: port 2(bridge_slave_1) entered disabled state [ 2755.162860] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:17 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a"}, 0x48) 04:06:17 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2755.379339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2755.389511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2755.412561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 04:06:17 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 04:06:17 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2755.428031] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2755.436285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2755.453211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2755.465781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2755.473471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2755.500658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2755.527494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2755.536430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2755.549434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2755.567192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2755.575047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2755.583267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2755.592911] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 04:06:18 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a"}, 0x48) [ 2755.598947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2755.607551] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2755.614150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2755.634783] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2755.647251] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2755.663403] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2755.679862] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2756.447706] bridge0: port 2(bridge_slave_1) entered disabled state [ 2756.456695] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:19 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:19 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2756.767468] bridge0: port 2(bridge_slave_1) entered disabled state [ 2756.774293] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:19 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:19 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:19 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2757.610624] device bridge_slave_1 left promiscuous mode [ 2757.616150] bridge0: port 2(bridge_slave_1) entered disabled state [ 2757.670798] device bridge_slave_0 left promiscuous mode [ 2757.680560] bridge0: port 1(bridge_slave_0) entered disabled state [ 2757.751398] device bridge_slave_1 left promiscuous mode [ 2757.756899] bridge0: port 2(bridge_slave_1) entered disabled state [ 2757.833130] device bridge_slave_0 left promiscuous mode [ 2757.838728] bridge0: port 1(bridge_slave_0) entered disabled state [ 2757.891328] device bridge_slave_1 left promiscuous mode [ 2757.896816] bridge0: port 2(bridge_slave_1) entered disabled state [ 2757.950809] device bridge_slave_0 left promiscuous mode [ 2757.956266] bridge0: port 1(bridge_slave_0) entered disabled state [ 2758.011501] device bridge_slave_1 left promiscuous mode [ 2758.016984] bridge0: port 2(bridge_slave_1) entered disabled state [ 2758.080779] device bridge_slave_0 left promiscuous mode [ 2758.086231] bridge0: port 1(bridge_slave_0) entered disabled state [ 2758.151808] device bridge_slave_1 left promiscuous mode [ 2758.157274] bridge0: port 2(bridge_slave_1) entered disabled state [ 2758.200704] device bridge_slave_0 left promiscuous mode [ 2758.206162] bridge0: port 1(bridge_slave_0) entered disabled state [ 2758.326107] device hsr_slave_1 left promiscuous mode [ 2758.392762] device hsr_slave_0 left promiscuous mode [ 2758.433621] team0 (unregistering): Port device team_slave_1 removed [ 2758.444771] team0 (unregistering): Port device team_slave_0 removed [ 2758.453971] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2758.492537] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2758.551367] bond0 (unregistering): Released all slaves [ 2758.641949] device hsr_slave_1 left promiscuous mode [ 2758.693825] device hsr_slave_0 left promiscuous mode [ 2758.735390] team0 (unregistering): Port device team_slave_1 removed [ 2758.744655] team0 (unregistering): Port device team_slave_0 removed [ 2758.754453] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2758.794938] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2758.870922] bond0 (unregistering): Released all slaves [ 2758.941600] device hsr_slave_1 left promiscuous mode [ 2758.994951] device hsr_slave_0 left promiscuous mode [ 2759.035196] team0 (unregistering): Port device team_slave_1 removed [ 2759.044610] team0 (unregistering): Port device team_slave_0 removed [ 2759.054265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2759.093283] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2759.170678] bond0 (unregistering): Released all slaves [ 2759.282599] device hsr_slave_1 left promiscuous mode [ 2759.352482] device hsr_slave_0 left promiscuous mode [ 2759.392584] team0 (unregistering): Port device team_slave_1 removed [ 2759.402084] team0 (unregistering): Port device team_slave_0 removed [ 2759.411261] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2759.464244] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2759.532616] bond0 (unregistering): Released all slaves [ 2759.651764] device hsr_slave_1 left promiscuous mode [ 2759.692283] device hsr_slave_0 left promiscuous mode [ 2759.732767] team0 (unregistering): Port device team_slave_1 removed [ 2759.744957] team0 (unregistering): Port device team_slave_0 removed [ 2759.753788] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2759.784370] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2759.851222] bond0 (unregistering): Released all slaves [ 2764.511955] IPVS: ftp: loaded support on port[0] = 21 [ 2765.444510] IPVS: ftp: loaded support on port[0] = 21 [ 2765.473952] chnl_net:caif_netlink_parms(): no params data found [ 2765.516108] IPVS: ftp: loaded support on port[0] = 21 [ 2765.579047] bridge0: port 1(bridge_slave_0) entered blocking state [ 2765.587139] bridge0: port 1(bridge_slave_0) entered disabled state [ 2765.594055] device bridge_slave_0 entered promiscuous mode [ 2765.607559] bridge0: port 2(bridge_slave_1) entered blocking state [ 2765.613969] bridge0: port 2(bridge_slave_1) entered disabled state [ 2765.622464] device bridge_slave_1 entered promiscuous mode [ 2765.645504] chnl_net:caif_netlink_parms(): no params data found [ 2765.661182] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2765.684731] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2765.686570] IPVS: ftp: loaded support on port[0] = 21 [ 2765.769639] chnl_net:caif_netlink_parms(): no params data found [ 2765.779076] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2765.786456] team0: Port device team_slave_0 added [ 2765.812007] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2765.819059] team0: Port device team_slave_1 added [ 2765.828225] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2765.843583] bridge0: port 1(bridge_slave_0) entered blocking state [ 2765.849984] bridge0: port 1(bridge_slave_0) entered disabled state [ 2765.857600] device bridge_slave_0 entered promiscuous mode [ 2765.864271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2765.882982] bridge0: port 2(bridge_slave_1) entered blocking state [ 2765.889331] bridge0: port 2(bridge_slave_1) entered disabled state [ 2765.896648] device bridge_slave_1 entered promiscuous mode [ 2765.934577] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2765.934736] IPVS: ftp: loaded support on port[0] = 21 [ 2765.947840] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2766.003948] device hsr_slave_0 entered promiscuous mode [ 2766.060456] device hsr_slave_1 entered promiscuous mode [ 2766.115242] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2766.127668] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2766.153023] bridge0: port 1(bridge_slave_0) entered blocking state [ 2766.159367] bridge0: port 1(bridge_slave_0) entered disabled state [ 2766.167933] device bridge_slave_0 entered promiscuous mode [ 2766.177044] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2766.184454] team0: Port device team_slave_0 added [ 2766.231368] bridge0: port 2(bridge_slave_1) entered blocking state [ 2766.237757] bridge0: port 2(bridge_slave_1) entered disabled state [ 2766.247060] device bridge_slave_1 entered promiscuous mode [ 2766.259785] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2766.267958] team0: Port device team_slave_1 added [ 2766.290869] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2766.300811] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2766.316016] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2766.325668] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2766.332901] chnl_net:caif_netlink_parms(): no params data found [ 2766.349640] bridge0: port 2(bridge_slave_1) entered blocking state [ 2766.356030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2766.362665] bridge0: port 1(bridge_slave_0) entered blocking state [ 2766.369083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2766.385636] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2766.392814] team0: Port device team_slave_0 added [ 2766.413449] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2766.421295] team0: Port device team_slave_1 added [ 2766.441606] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2766.482222] device hsr_slave_0 entered promiscuous mode [ 2766.520334] device hsr_slave_1 entered promiscuous mode [ 2766.592863] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2766.606736] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2766.615357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2766.629102] bridge0: port 1(bridge_slave_0) entered disabled state [ 2766.635895] bridge0: port 2(bridge_slave_1) entered disabled state [ 2766.646434] bridge0: port 1(bridge_slave_0) entered blocking state [ 2766.652891] bridge0: port 1(bridge_slave_0) entered disabled state [ 2766.660243] device bridge_slave_0 entered promiscuous mode [ 2766.661115] IPVS: ftp: loaded support on port[0] = 21 [ 2766.724190] device hsr_slave_0 entered promiscuous mode [ 2766.762949] device hsr_slave_1 entered promiscuous mode [ 2766.815621] bridge0: port 2(bridge_slave_1) entered blocking state [ 2766.822246] bridge0: port 2(bridge_slave_1) entered disabled state [ 2766.829149] device bridge_slave_1 entered promiscuous mode [ 2766.844857] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2766.871681] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2766.879508] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2766.889785] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2766.903073] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2766.976992] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2766.984250] team0: Port device team_slave_0 added [ 2766.999006] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2767.013822] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2767.023900] team0: Port device team_slave_1 added [ 2767.033891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2767.047451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2767.055221] chnl_net:caif_netlink_parms(): no params data found [ 2767.077539] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2767.086234] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2767.114066] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2767.183352] device hsr_slave_0 entered promiscuous mode [ 2767.220429] device hsr_slave_1 entered promiscuous mode [ 2767.261162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2767.268013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2767.339957] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2767.347179] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2767.358127] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2767.364696] 8021q: adding VLAN 0 to HW filter on device team0 [ 2767.376281] bridge0: port 1(bridge_slave_0) entered blocking state [ 2767.383007] bridge0: port 1(bridge_slave_0) entered disabled state [ 2767.389997] device bridge_slave_0 entered promiscuous mode [ 2767.397765] bridge0: port 2(bridge_slave_1) entered blocking state [ 2767.404315] bridge0: port 2(bridge_slave_1) entered disabled state [ 2767.411621] device bridge_slave_1 entered promiscuous mode [ 2767.440312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2767.454576] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2767.463876] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2767.473920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2767.481902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2767.489403] bridge0: port 1(bridge_slave_0) entered blocking state [ 2767.495766] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2767.510716] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2767.518858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2767.527077] chnl_net:caif_netlink_parms(): no params data found [ 2767.572988] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2767.579361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2767.587241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2767.595642] bridge0: port 2(bridge_slave_1) entered blocking state [ 2767.602026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2767.610567] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2767.618953] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2767.647074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2767.655294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2767.664023] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2767.672813] team0: Port device team_slave_0 added [ 2767.678316] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2767.685847] team0: Port device team_slave_1 added [ 2767.695601] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2767.703736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2767.712097] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2767.719498] bridge0: port 1(bridge_slave_0) entered blocking state [ 2767.726118] bridge0: port 1(bridge_slave_0) entered disabled state [ 2767.735871] device bridge_slave_0 entered promiscuous mode [ 2767.743262] bridge0: port 2(bridge_slave_1) entered blocking state [ 2767.749648] bridge0: port 2(bridge_slave_1) entered disabled state [ 2767.757007] device bridge_slave_1 entered promiscuous mode [ 2767.770354] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2767.777876] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2767.790472] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2767.797731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2767.804820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2767.815145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2767.823925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2767.852315] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2767.861555] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2767.883153] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2767.890963] team0: Port device team_slave_0 added [ 2767.896448] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2767.904970] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2767.911458] 8021q: adding VLAN 0 to HW filter on device team0 [ 2767.962374] device hsr_slave_0 entered promiscuous mode [ 2768.000339] device hsr_slave_1 entered promiscuous mode [ 2768.061020] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2768.067348] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2768.083215] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2768.093491] team0: Port device team_slave_1 added [ 2768.098676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2768.108524] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2768.116140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2768.127980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2768.136275] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2768.147188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2768.155300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2768.163134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2768.170865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2768.178336] bridge0: port 1(bridge_slave_0) entered blocking state [ 2768.184707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2768.195402] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2768.209319] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2768.217084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2768.225963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2768.234050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2768.241329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2768.248105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2768.255185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2768.262762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2768.270361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2768.277974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2768.285572] bridge0: port 2(bridge_slave_1) entered blocking state [ 2768.291920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2768.306986] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2768.317325] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2768.323678] 8021q: adding VLAN 0 to HW filter on device team0 [ 2768.335266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2768.383517] device hsr_slave_0 entered promiscuous mode [ 2768.420487] device hsr_slave_1 entered promiscuous mode [ 2768.461090] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2768.474501] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2768.481718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2768.489249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2768.496816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2768.504986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2768.512138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2768.521180] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2768.528244] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2768.535887] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2768.547290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2768.557655] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2768.563826] 8021q: adding VLAN 0 to HW filter on device team0 [ 2768.573467] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2768.579593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2768.587632] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2768.595240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2768.602995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2768.610859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2768.618335] bridge0: port 1(bridge_slave_0) entered blocking state [ 2768.624698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2768.632310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2768.645716] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2768.654368] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2768.666921] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2768.680784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2768.688438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2768.696046] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2768.703862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2768.712182] bridge0: port 1(bridge_slave_0) entered blocking state [ 2768.718526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2768.727319] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2768.734620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2768.742966] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2768.751703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2768.761576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2768.772094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2768.782789] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2768.789859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2768.799640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2768.810196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2768.817912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2768.825670] bridge0: port 2(bridge_slave_1) entered blocking state [ 2768.832044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2768.838818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2768.846897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2768.854412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2768.861975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2768.869260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2768.877210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2768.884842] bridge0: port 2(bridge_slave_1) entered blocking state [ 2768.891205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2768.897982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2768.905633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2768.915913] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2768.926843] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2768.938902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2768.950993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2768.957813] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2768.969870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2768.977579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2768.985316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2768.993028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2769.002625] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2769.015819] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2769.022627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2769.034731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2769.047195] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2769.056686] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2769.065443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2769.072404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2769.080386] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2769.087990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2769.095941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2769.103569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2769.111733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2769.119177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2769.141953] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2769.147955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2769.165068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2769.175025] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2769.192461] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2769.209838] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2769.219522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2769.227441] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2769.235245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2769.243391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2769.252394] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2769.260760] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2769.266838] 8021q: adding VLAN 0 to HW filter on device team0 [ 2769.276028] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2769.287146] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2769.425022] bridge0: port 2(bridge_slave_1) entered disabled state [ 2769.432831] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:32 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2769.657177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2769.670700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2769.677586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2769.686746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2769.693635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2769.701251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2769.710709] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2769.719566] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2769.733520] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2769.744599] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2769.766515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2769.775044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2769.783151] bridge0: port 1(bridge_slave_0) entered blocking state [ 2769.789505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2769.796640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2769.804898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2769.812492] bridge0: port 2(bridge_slave_1) entered blocking state [ 2769.818814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2769.825699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2769.833699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2769.844790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2769.857655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2769.872726] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2769.892696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2769.905327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 04:06:32 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2769.917563] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2769.936908] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2769.943394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2769.955588] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2769.965031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 04:06:32 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2769.974668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2769.982385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2769.989563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2770.012033] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2770.020368] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2770.026454] 8021q: adding VLAN 0 to HW filter on device team0 [ 2770.040625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2770.049408] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2770.124468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2770.147675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2770.166225] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2770.196536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2770.216783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2770.240641] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2770.262718] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2770.543654] bridge0: port 2(bridge_slave_1) entered disabled state [ 2770.552202] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:33 executing program 2: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0x2000000) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) creat(&(0x7f0000000040)='./file0\x00', 0x88) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x180) open$dir(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000100)='./file0\x00', 0x2) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(0x0, 0x0, 0x3f5) [ 2770.857905] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2770.869123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 04:06:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x80001, 0x0) write(r0, &(0x7f0000000000)="bc", 0x337) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000a80)) r1 = syz_open_pts(r0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffe}) readv(r1, &(0x7f00000001c0), 0xce) [ 2770.926702] bridge0: port 2(bridge_slave_1) entered disabled state [ 2770.933339] bridge0: port 1(bridge_slave_0) entered disabled state [ 2770.966188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2770.984696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2770.993573] bridge0: port 1(bridge_slave_0) entered blocking state [ 2770.999916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2771.006868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2771.014373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2771.021828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2771.029178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2771.040643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2771.062250] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2771.068332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2771.076684] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 04:06:33 executing program 2: socket$nl_route(0x10, 0x3, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x86}) read(r1, &(0x7f00000000c0)=""/19, 0x200000c8) signalfd(r1, &(0x7f0000000300)={0x1}, 0x8) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x2, 0x4, 0x0, 0x0, [@mcast2]}, 0x18) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x6000000, @remote, 0x2}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[], @ANYBLOB="6a93390a745d05b71e996cf9f4b48cb35c8a12f780f79c3cf57d83d4c0360ddad2b903beee4c9fcfe25370afb7d3272003e8c40c2da28117571cfaad6b7618cebd06ee9ca4010d856b1a7784e2b388075537d3450ec2ca58ebcc4e0c34fb7e40acb012d1b07d6587a1f46aee1f710a985b6c04983a2c129057403190d907d7c87dff5f8054cdb6cfbb2082cf4a", @ANYBLOB]) dup(0xffffffffffffffff) getuid() times(0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x8801, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000040)=0x6e, 0x0) [ 2771.095751] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2771.102218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2771.109845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2771.117801] bridge0: port 2(bridge_slave_1) entered blocking state [ 2771.124191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2771.137910] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2771.158169] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2771.176785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2771.198460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2771.216732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2771.233329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2771.244484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2771.263971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2771.273955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2771.282497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2771.290223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2771.421980] bridge0: port 2(bridge_slave_1) entered disabled state [ 2771.429719] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:34 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x28101) writev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="d9", 0x1}], 0x1) 04:06:34 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a"}, 0x48) 04:06:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x80003, 0xf7) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0800b5055e0bcfe87b2071") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="440400002800070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000800010063627100180402000404060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000004000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a193ec32adcd00000000000000000000000000000000000000000000000000ffe800000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000204ea72b265cd683000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002e3c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100005000500000000006198cc6884bdedaea3074cf77f"], 0x444}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 2771.657673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2771.665151] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2771.672938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2771.690499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2771.716209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2771.729475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2771.743831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2771.760260] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2771.769044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2771.851815] bridge0: port 2(bridge_slave_1) entered disabled state [ 2771.858451] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:34 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce2"}, 0x4a) 04:06:34 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2771.910722] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2771.937397] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2772.320677] device bridge_slave_1 left promiscuous mode [ 2772.326197] bridge0: port 2(bridge_slave_1) entered disabled state [ 2772.391129] device bridge_slave_0 left promiscuous mode [ 2772.396691] bridge0: port 1(bridge_slave_0) entered disabled state [ 2772.451577] device bridge_slave_1 left promiscuous mode [ 2772.458239] bridge0: port 2(bridge_slave_1) entered disabled state [ 2772.510789] device bridge_slave_0 left promiscuous mode [ 2772.516303] bridge0: port 1(bridge_slave_0) entered disabled state [ 2772.571560] device bridge_slave_1 left promiscuous mode [ 2772.578227] bridge0: port 2(bridge_slave_1) entered disabled state [ 2772.630828] device bridge_slave_0 left promiscuous mode [ 2772.636321] bridge0: port 1(bridge_slave_0) entered disabled state [ 2772.732277] device hsr_slave_1 left promiscuous mode [ 2772.773762] device hsr_slave_0 left promiscuous mode [ 2772.813806] team0 (unregistering): Port device team_slave_1 removed [ 2772.825410] team0 (unregistering): Port device team_slave_0 removed [ 2772.834781] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2772.883554] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2772.974437] bond0 (unregistering): Released all slaves [ 2773.052490] device hsr_slave_1 left promiscuous mode [ 2773.092605] device hsr_slave_0 left promiscuous mode [ 2773.145064] team0 (unregistering): Port device team_slave_1 removed [ 2773.154524] team0 (unregistering): Port device team_slave_0 removed [ 2773.163735] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2773.205281] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2773.263725] bond0 (unregistering): Released all slaves [ 2773.352121] device hsr_slave_1 left promiscuous mode [ 2773.392580] device hsr_slave_0 left promiscuous mode [ 2773.452745] team0 (unregistering): Port device team_slave_1 removed [ 2773.462572] team0 (unregistering): Port device team_slave_0 removed [ 2773.471787] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2773.493381] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2773.582785] bond0 (unregistering): Released all slaves 04:06:36 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:36 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce2"}, 0x4a) 04:06:36 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2773.644700] bridge0: port 2(bridge_slave_1) entered disabled state [ 2773.651240] bridge0: port 1(bridge_slave_0) entered disabled state [ 2777.081333] IPVS: ftp: loaded support on port[0] = 21 [ 2777.942175] IPVS: ftp: loaded support on port[0] = 21 [ 2777.950902] chnl_net:caif_netlink_parms(): no params data found [ 2778.007716] bridge0: port 1(bridge_slave_0) entered blocking state [ 2778.014440] bridge0: port 1(bridge_slave_0) entered disabled state [ 2778.021801] device bridge_slave_0 entered promiscuous mode [ 2778.031262] bridge0: port 2(bridge_slave_1) entered blocking state [ 2778.037641] bridge0: port 2(bridge_slave_1) entered disabled state [ 2778.044641] device bridge_slave_1 entered promiscuous mode [ 2778.060585] IPVS: ftp: loaded support on port[0] = 21 [ 2778.077385] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2778.086140] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2778.105697] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2778.113833] team0: Port device team_slave_0 added [ 2778.123509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2778.130782] team0: Port device team_slave_1 added [ 2778.136034] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2778.145522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2778.233684] device hsr_slave_0 entered promiscuous mode [ 2778.270379] device hsr_slave_1 entered promiscuous mode [ 2778.313642] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2778.340902] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2778.358686] chnl_net:caif_netlink_parms(): no params data found [ 2778.397701] IPVS: ftp: loaded support on port[0] = 21 [ 2778.398401] bridge0: port 2(bridge_slave_1) entered blocking state [ 2778.409303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2778.415909] bridge0: port 1(bridge_slave_0) entered blocking state [ 2778.422277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2778.455560] bridge0: port 1(bridge_slave_0) entered blocking state [ 2778.462506] bridge0: port 1(bridge_slave_0) entered disabled state [ 2778.469297] device bridge_slave_0 entered promiscuous mode [ 2778.476540] bridge0: port 2(bridge_slave_1) entered blocking state [ 2778.483059] bridge0: port 2(bridge_slave_1) entered disabled state [ 2778.489911] device bridge_slave_1 entered promiscuous mode [ 2778.510961] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2778.534628] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2778.615596] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2778.623214] team0: Port device team_slave_0 added [ 2778.631337] chnl_net:caif_netlink_parms(): no params data found [ 2778.644328] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2778.652274] team0: Port device team_slave_1 added [ 2778.682630] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2778.694708] IPVS: ftp: loaded support on port[0] = 21 [ 2778.718299] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2778.728391] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2778.734658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2778.772918] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2778.783836] bridge0: port 1(bridge_slave_0) entered blocking state [ 2778.793418] bridge0: port 1(bridge_slave_0) entered disabled state [ 2778.801826] device bridge_slave_0 entered promiscuous mode [ 2778.843379] device hsr_slave_0 entered promiscuous mode [ 2778.880345] device hsr_slave_1 entered promiscuous mode [ 2778.922899] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2778.929950] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2778.944007] bridge0: port 2(bridge_slave_1) entered blocking state [ 2778.951290] bridge0: port 2(bridge_slave_1) entered disabled state [ 2778.958167] device bridge_slave_1 entered promiscuous mode [ 2778.979771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2778.988299] bridge0: port 1(bridge_slave_0) entered disabled state [ 2778.995531] bridge0: port 2(bridge_slave_1) entered disabled state [ 2779.003103] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2779.013564] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2779.019623] 8021q: adding VLAN 0 to HW filter on device team0 [ 2779.056785] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2779.064361] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2779.099657] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2779.113583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2779.137788] chnl_net:caif_netlink_parms(): no params data found [ 2779.148119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2779.155851] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2779.163539] bridge0: port 1(bridge_slave_0) entered blocking state [ 2779.169869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2779.181428] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2779.223188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2779.231059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2779.238679] bridge0: port 2(bridge_slave_1) entered blocking state [ 2779.245047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2779.255431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2779.264094] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2779.271906] team0: Port device team_slave_0 added [ 2779.323754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2779.338817] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2779.351347] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2779.358449] team0: Port device team_slave_1 added [ 2779.398427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2779.412369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2779.420597] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2779.438477] bridge0: port 1(bridge_slave_0) entered blocking state [ 2779.446059] bridge0: port 1(bridge_slave_0) entered disabled state [ 2779.457284] device bridge_slave_0 entered promiscuous mode [ 2779.469068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2779.482916] chnl_net:caif_netlink_parms(): no params data found [ 2779.498183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2779.506126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2779.519122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2779.526840] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2779.538509] bridge0: port 2(bridge_slave_1) entered blocking state [ 2779.545556] bridge0: port 2(bridge_slave_1) entered disabled state [ 2779.554196] device bridge_slave_1 entered promiscuous mode [ 2779.564595] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2779.571689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2779.579250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2779.606428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2779.620939] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2779.674020] device hsr_slave_0 entered promiscuous mode [ 2779.710378] device hsr_slave_1 entered promiscuous mode [ 2779.766296] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2779.778070] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2779.786935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2779.795526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2779.808125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2779.817247] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2779.824189] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2779.838870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2779.846212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2779.885069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2779.893088] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2779.900824] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2779.906891] 8021q: adding VLAN 0 to HW filter on device team0 [ 2779.917541] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2779.924659] team0: Port device team_slave_0 added [ 2779.930649] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2779.937716] team0: Port device team_slave_1 added [ 2779.944634] bridge0: port 1(bridge_slave_0) entered blocking state [ 2779.951454] bridge0: port 1(bridge_slave_0) entered disabled state [ 2779.958343] device bridge_slave_0 entered promiscuous mode [ 2779.965481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2779.973339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2779.994809] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2780.006698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2780.015359] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2780.022717] bridge0: port 2(bridge_slave_1) entered blocking state [ 2780.029049] bridge0: port 2(bridge_slave_1) entered disabled state [ 2780.036686] device bridge_slave_1 entered promiscuous mode [ 2780.054173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2780.061997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2780.069445] bridge0: port 1(bridge_slave_0) entered blocking state [ 2780.075827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2780.084602] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2780.092533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2780.104973] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2780.115879] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2780.126256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2780.136249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2780.144763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2780.152391] bridge0: port 2(bridge_slave_1) entered blocking state [ 2780.158711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2780.178495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2780.187131] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2780.244612] device hsr_slave_0 entered promiscuous mode [ 2780.300312] device hsr_slave_1 entered promiscuous mode [ 2780.340519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2780.350647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2780.359902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2780.380334] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2780.387164] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2780.395203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2780.402874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2780.412187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2780.420838] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2780.428341] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2780.435705] team0: Port device team_slave_0 added [ 2780.445096] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2780.453534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2780.460745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2780.468480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2780.476216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2780.494869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2780.515696] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2780.522439] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2780.529509] team0: Port device team_slave_1 added [ 2780.538005] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2780.550553] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2780.558369] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2780.565520] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2780.573100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2780.582040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2780.589435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2780.596680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2780.718085] bridge0: port 2(bridge_slave_1) entered disabled state [ 2780.726827] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:43 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:43 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2780.938451] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2780.945418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2780.975308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2781.014573] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2781.031250] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2781.037330] 8021q: adding VLAN 0 to HW filter on device team0 [ 2781.050404] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2781.068095] 8021q: adding VLAN 0 to HW filter on device batadv0 04:06:43 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2781.134830] device hsr_slave_0 entered promiscuous mode [ 2781.180353] device hsr_slave_1 entered promiscuous mode [ 2781.224686] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2781.237242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 04:06:43 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2781.288793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2781.304656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2781.320944] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2781.328525] bridge0: port 1(bridge_slave_0) entered blocking state [ 2781.334910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2781.360739] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2781.369066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2781.388447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2781.405740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2781.420472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2781.428022] bridge0: port 2(bridge_slave_1) entered blocking state [ 2781.434399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2781.457925] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2781.470910] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2781.485827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2781.498179] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2781.509846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2781.530672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2781.537516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2781.571908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2781.605946] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2781.628811] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2781.651550] 8021q: adding VLAN 0 to HW filter on device team0 [ 2781.657835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2781.658362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2781.698999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2781.740877] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2781.749714] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2781.767227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2781.776034] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2781.787038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2781.794868] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2781.802560] bridge0: port 1(bridge_slave_0) entered blocking state [ 2781.808897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2781.815880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2781.823723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2781.831378] bridge0: port 2(bridge_slave_1) entered blocking state 04:06:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mprotect(&(0x7f000088b000/0x3000)=nil, 0x3000, 0x223dd8d19c676d41) 04:06:44 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2781.837705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2781.844624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2781.852415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2781.862073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2781.883539] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2781.892263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2781.899655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2781.909980] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2781.918763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2781.928775] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2781.941940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2781.953037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2781.979445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2782.009263] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2782.017786] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2782.031092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2782.044964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2782.057716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2782.065646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2782.076991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2782.087939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2782.099383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2782.122461] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2782.128535] 8021q: adding VLAN 0 to HW filter on device team0 [ 2782.150132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2782.178646] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2782.192666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2782.212008] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2782.218956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2782.236952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2782.255649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2782.272175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2782.285502] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2782.306573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2782.319066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2782.347165] bridge0: port 1(bridge_slave_0) entered blocking state [ 2782.353551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2782.370579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2782.378088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2782.408638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2782.422496] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2782.429299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2782.446848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2782.454756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2782.470661] bridge0: port 2(bridge_slave_1) entered blocking state [ 2782.477038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2782.504211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2782.516696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2782.526880] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2782.535528] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2782.544998] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2782.556369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2782.566892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2782.576735] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2782.586144] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2782.597229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2782.605303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2782.613310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2782.621340] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2782.631173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2782.645602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2782.656875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2782.664865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2782.673424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2782.681342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2782.689035] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2782.699979] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2782.709321] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2782.717595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2782.729522] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2782.737681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2782.748009] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2782.777743] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2782.791274] 8021q: adding VLAN 0 to HW filter on device batadv0 04:06:45 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$packet_buf(r0, 0x107, 0xa, 0x0, &(0x7f0000000040)=0x118) 04:06:45 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:06:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x1) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="17bcbd13ea1a0cf2f8e72387ae6ce3f8fb2c9df8"], 0x14) [ 2783.093615] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 2783.108313] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2783.117916] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2783.196747] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 2783.206247] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2783.215690] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:06:45 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2783.377174] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 2783.393123] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2783.408478] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2783.441260] bridge0: port 2(bridge_slave_1) entered disabled state [ 2783.447789] bridge0: port 1(bridge_slave_0) entered disabled state [ 2783.747533] bridge0: port 2(bridge_slave_1) entered disabled state [ 2783.755651] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:46 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce2"}, 0x4a) 04:06:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x1) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="17bcbd13ea1a0cf2f8e72387ae6ce3f8fb2c9df8"], 0x14) 04:06:46 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2784.970642] device bridge_slave_1 left promiscuous mode [ 2784.976201] bridge0: port 2(bridge_slave_1) entered disabled state [ 2785.010946] device bridge_slave_0 left promiscuous mode [ 2785.016460] bridge0: port 1(bridge_slave_0) entered disabled state [ 2785.061483] device bridge_slave_1 left promiscuous mode [ 2785.066929] bridge0: port 2(bridge_slave_1) entered disabled state [ 2785.111264] device bridge_slave_0 left promiscuous mode [ 2785.116775] bridge0: port 1(bridge_slave_0) entered disabled state [ 2785.201348] device bridge_slave_1 left promiscuous mode [ 2785.206844] bridge0: port 2(bridge_slave_1) entered disabled state [ 2785.254601] device bridge_slave_0 left promiscuous mode [ 2785.260218] bridge0: port 1(bridge_slave_0) entered disabled state [ 2785.311720] device bridge_slave_1 left promiscuous mode [ 2785.317197] bridge0: port 2(bridge_slave_1) entered disabled state [ 2785.360851] device bridge_slave_0 left promiscuous mode [ 2785.366408] bridge0: port 1(bridge_slave_0) entered disabled state [ 2785.412064] device bridge_slave_1 left promiscuous mode [ 2785.417522] bridge0: port 2(bridge_slave_1) entered disabled state [ 2785.480803] device bridge_slave_0 left promiscuous mode [ 2785.486297] bridge0: port 1(bridge_slave_0) entered disabled state [ 2785.531296] device bridge_slave_1 left promiscuous mode [ 2785.536742] bridge0: port 2(bridge_slave_1) entered disabled state [ 2785.590930] device bridge_slave_0 left promiscuous mode [ 2785.596384] bridge0: port 1(bridge_slave_0) entered disabled state [ 2785.681636] device hsr_slave_1 left promiscuous mode [ 2785.723507] device hsr_slave_0 left promiscuous mode [ 2785.763014] team0 (unregistering): Port device team_slave_1 removed [ 2785.773308] team0 (unregistering): Port device team_slave_0 removed [ 2785.782605] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2785.815110] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2785.874833] bond0 (unregistering): Released all slaves [ 2785.952746] device hsr_slave_1 left promiscuous mode [ 2785.994652] device hsr_slave_0 left promiscuous mode [ 2786.032990] team0 (unregistering): Port device team_slave_1 removed [ 2786.044381] team0 (unregistering): Port device team_slave_0 removed [ 2786.053753] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2786.095225] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2786.163209] bond0 (unregistering): Released all slaves [ 2786.262795] device hsr_slave_1 left promiscuous mode [ 2786.303851] device hsr_slave_0 left promiscuous mode [ 2786.343957] team0 (unregistering): Port device team_slave_1 removed [ 2786.353705] team0 (unregistering): Port device team_slave_0 removed [ 2786.364060] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2786.406019] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2786.463785] bond0 (unregistering): Released all slaves [ 2786.562532] device hsr_slave_1 left promiscuous mode [ 2786.603843] device hsr_slave_0 left promiscuous mode [ 2786.654698] team0 (unregistering): Port device team_slave_1 removed [ 2786.665297] team0 (unregistering): Port device team_slave_0 removed [ 2786.676590] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2786.715579] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2786.774975] bond0 (unregistering): Released all slaves [ 2786.862621] device hsr_slave_1 left promiscuous mode [ 2786.904093] device hsr_slave_0 left promiscuous mode [ 2786.944231] team0 (unregistering): Port device team_slave_1 removed [ 2786.954056] team0 (unregistering): Port device team_slave_0 removed [ 2786.964332] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2787.005389] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2787.074447] bond0 (unregistering): Released all slaves [ 2787.182053] device hsr_slave_1 left promiscuous mode [ 2787.222892] device hsr_slave_0 left promiscuous mode [ 2787.263032] team0 (unregistering): Port device team_slave_1 removed [ 2787.273389] team0 (unregistering): Port device team_slave_0 removed [ 2787.282748] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2787.323567] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2787.383394] bond0 (unregistering): Released all slaves [ 2792.841373] IPVS: ftp: loaded support on port[0] = 21 [ 2793.741990] chnl_net:caif_netlink_parms(): no params data found [ 2793.742191] IPVS: ftp: loaded support on port[0] = 21 [ 2793.786116] bridge0: port 1(bridge_slave_0) entered blocking state [ 2793.792600] bridge0: port 1(bridge_slave_0) entered disabled state [ 2793.799377] device bridge_slave_0 entered promiscuous mode [ 2793.815830] bridge0: port 2(bridge_slave_1) entered blocking state [ 2793.822450] bridge0: port 2(bridge_slave_1) entered disabled state [ 2793.829263] device bridge_slave_1 entered promiscuous mode [ 2793.852664] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2793.861737] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2793.883679] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2793.890952] team0: Port device team_slave_0 added [ 2793.898165] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2793.905313] team0: Port device team_slave_1 added [ 2793.910638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2793.917870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2793.972421] device hsr_slave_0 entered promiscuous mode [ 2794.010320] device hsr_slave_1 entered promiscuous mode [ 2794.050952] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2794.057872] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2794.072253] bridge0: port 2(bridge_slave_1) entered blocking state [ 2794.078606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2794.085215] bridge0: port 1(bridge_slave_0) entered blocking state [ 2794.091570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2794.173814] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2794.179906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2794.193576] chnl_net:caif_netlink_parms(): no params data found [ 2794.206031] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2794.220925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2794.228037] bridge0: port 1(bridge_slave_0) entered disabled state [ 2794.235043] bridge0: port 2(bridge_slave_1) entered disabled state [ 2794.243848] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2794.249906] 8021q: adding VLAN 0 to HW filter on device team0 [ 2794.263217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2794.271037] bridge0: port 1(bridge_slave_0) entered blocking state [ 2794.277355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2794.300259] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2794.307771] bridge0: port 2(bridge_slave_1) entered blocking state [ 2794.314221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2794.327352] bridge0: port 1(bridge_slave_0) entered blocking state [ 2794.334003] bridge0: port 1(bridge_slave_0) entered disabled state [ 2794.341181] device bridge_slave_0 entered promiscuous mode [ 2794.347913] bridge0: port 2(bridge_slave_1) entered blocking state [ 2794.354304] bridge0: port 2(bridge_slave_1) entered disabled state [ 2794.361794] device bridge_slave_1 entered promiscuous mode [ 2794.386586] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2794.396671] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2794.407350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2794.414919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2794.431433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2794.449585] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2794.456744] team0: Port device team_slave_0 added [ 2794.462703] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2794.469719] team0: Port device team_slave_1 added [ 2794.475547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2794.486574] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2794.497115] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2794.503230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2794.513444] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2794.520981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2794.528459] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2794.547082] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2794.558346] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2794.603188] device hsr_slave_0 entered promiscuous mode [ 2794.640280] device hsr_slave_1 entered promiscuous mode [ 2794.683016] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2794.691408] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2794.706999] bridge0: port 2(bridge_slave_1) entered blocking state [ 2794.713365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2794.734003] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2794.746017] bridge0: port 2(bridge_slave_1) entered disabled state [ 2794.766319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2794.776142] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2794.784622] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2794.793155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2794.800798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2794.809877] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2794.816756] 8021q: adding VLAN 0 to HW filter on device team0 [ 2794.828663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2794.836036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2794.844163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2794.852338] bridge0: port 1(bridge_slave_0) entered blocking state [ 2794.858752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2794.985420] bridge0: port 2(bridge_slave_1) entered disabled state [ 2794.993251] bridge0: port 1(bridge_slave_0) entered disabled state 04:06:57 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:57 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:06:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x1) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="17bcbd13ea1a0cf2f8e72387ae6ce3f8fb2c9df8"], 0x14) 04:06:57 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2795.187913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2795.198690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2795.207038] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2795.215468] bridge0: port 2(bridge_slave_1) entered blocking state [ 2795.221863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2795.248944] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2795.269392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2795.297355] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2795.307301] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 2795.321963] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2795.330796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2795.337536] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2795.363871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2795.389939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2795.397695] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2795.405453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2795.428623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2795.449996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2795.459843] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2795.473097] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2795.480538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2795.487934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2795.498491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2795.505684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2795.513162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2795.523917] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2795.529934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2795.542594] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2795.552302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2795.740693] device bridge_slave_1 left promiscuous mode [ 2795.746214] bridge0: port 2(bridge_slave_1) entered disabled state 04:06:58 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x80, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000}, 0x1c) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setattr(r2, 0x0, 0x0) syz_open_procfs(r2, &(0x7f0000000000)='net/ip_mr_vif\x00') recvmmsg(r1, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0xf37, 0x7) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup2(r0, r3) openat$kvm(0xffffffffffffff9c, &(0x7f0000001100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) fsetxattr$security_ima(r4, &(0x7f0000000140)='security.ima\x00', &(0x7f00000001c0)=@v1={0x2, "e784141c56c00ef270787a3b82dae37485"}, 0x12, 0x2) statfs(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)=""/224) gettid() dup2(0xffffffffffffffff, 0xffffffffffffffff) 04:06:58 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x1) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="17bcbd13ea1a0cf2f8e72387ae6ce3f8fb2c9df8"], 0x14) 04:06:58 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:06:58 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2795.791944] device bridge_slave_0 left promiscuous mode [ 2795.797541] bridge0: port 1(bridge_slave_0) entered disabled state [ 2795.843677] device bridge_slave_1 left promiscuous mode [ 2795.854643] bridge0: port 2(bridge_slave_1) entered disabled state [ 2795.931627] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 2795.941019] device bridge_slave_0 left promiscuous mode [ 2795.946638] bridge0: port 1(bridge_slave_0) entered disabled state [ 2795.949728] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2795.979603] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2796.055720] device hsr_slave_1 left promiscuous mode 04:06:58 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2796.113420] device hsr_slave_0 left promiscuous mode [ 2796.173392] team0 (unregistering): Port device team_slave_1 removed [ 2796.198348] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2796.212781] EXT4-fs (loop2): unsupported descriptor size 0 [ 2796.226800] team0 (unregistering): Port device team_slave_0 removed [ 2796.237549] bond0 (unregistering): Releasing backup interface bond_slave_1 04:06:58 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2796.284417] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2796.349600] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2796.387663] EXT4-fs (loop2): unsupported descriptor size 0 [ 2796.396518] bond0 (unregistering): Released all slaves 04:06:58 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2796.513471] device hsr_slave_1 left promiscuous mode [ 2796.561724] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2796.570173] EXT4-fs (loop2): unsupported descriptor size 0 [ 2796.579715] device hsr_slave_0 left promiscuous mode 04:06:59 executing program 2: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2796.634569] team0 (unregistering): Port device team_slave_1 removed [ 2796.651424] team0 (unregistering): Port device team_slave_0 removed [ 2796.669677] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2796.672843] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2796.695036] bond0 (unregistering): Releasing backup interface bond_slave_0 04:06:59 executing program 2: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:06:59 executing program 2: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2796.797506] bond0 (unregistering): Released all slaves [ 2796.817375] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:06:59 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2796.993212] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2799.211328] IPVS: ftp: loaded support on port[0] = 21 [ 2800.061048] chnl_net:caif_netlink_parms(): no params data found [ 2800.101749] bridge0: port 1(bridge_slave_0) entered blocking state [ 2800.108152] bridge0: port 1(bridge_slave_0) entered disabled state [ 2800.117094] device bridge_slave_0 entered promiscuous mode [ 2800.124005] bridge0: port 2(bridge_slave_1) entered blocking state [ 2800.130628] bridge0: port 2(bridge_slave_1) entered disabled state [ 2800.137419] device bridge_slave_1 entered promiscuous mode [ 2800.158965] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2800.167863] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2800.186281] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2800.193505] team0: Port device team_slave_0 added [ 2800.198762] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2800.206209] team0: Port device team_slave_1 added [ 2800.211503] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2800.218607] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2800.273489] device hsr_slave_0 entered promiscuous mode [ 2800.300274] device hsr_slave_1 entered promiscuous mode [ 2800.354054] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2800.361162] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2800.374907] bridge0: port 2(bridge_slave_1) entered blocking state [ 2800.381256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2800.387842] bridge0: port 1(bridge_slave_0) entered blocking state [ 2800.394206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2800.419940] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2800.426358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2800.437950] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2800.446200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2800.453387] bridge0: port 1(bridge_slave_0) entered disabled state [ 2800.459935] bridge0: port 2(bridge_slave_1) entered disabled state [ 2800.469568] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2800.476722] 8021q: adding VLAN 0 to HW filter on device team0 [ 2800.487403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2800.495049] bridge0: port 1(bridge_slave_0) entered blocking state [ 2800.501404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2800.510713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2800.518224] bridge0: port 2(bridge_slave_1) entered blocking state [ 2800.524587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2800.537350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2800.545819] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2800.561005] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2800.571321] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2800.581822] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2800.588124] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2800.595794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2800.603316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2800.611928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2800.624944] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2800.636215] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2800.740615] device bridge_slave_1 left promiscuous mode [ 2800.746274] bridge0: port 2(bridge_slave_1) entered disabled state [ 2800.771710] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2800.780779] device bridge_slave_0 left promiscuous mode [ 2800.786249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2800.911668] device hsr_slave_1 left promiscuous mode [ 2800.972819] device hsr_slave_0 left promiscuous mode [ 2801.012998] team0 (unregistering): Port device team_slave_1 removed [ 2801.023077] team0 (unregistering): Port device team_slave_0 removed [ 2801.032478] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2801.073380] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2801.153967] bond0 (unregistering): Released all slaves [ 2801.233184] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2801.242715] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2801.251117] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2801.262039] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2801.274674] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2801.284600] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2801.295470] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2801.305680] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2801.315348] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2801.327351] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 04:07:03 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c20e0000aaaaaaaaaaaa08060006080006040001000000045d49ac141425aaaaaaaaaa00ac1414aa"], 0x0) 04:07:03 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:03 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:03 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:03 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:03 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x39) 04:07:03 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:04 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:04 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:04 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce2"}, 0x4a) 04:07:04 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2801.626064] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2802.119028] bridge0: port 2(bridge_slave_1) entered disabled state [ 2802.128315] bridge0: port 1(bridge_slave_0) entered disabled state [ 2804.151450] IPVS: ftp: loaded support on port[0] = 21 [ 2804.994404] chnl_net:caif_netlink_parms(): no params data found [ 2805.029444] bridge0: port 1(bridge_slave_0) entered blocking state [ 2805.036338] bridge0: port 1(bridge_slave_0) entered disabled state [ 2805.043723] device bridge_slave_0 entered promiscuous mode [ 2805.050511] bridge0: port 2(bridge_slave_1) entered blocking state [ 2805.056980] bridge0: port 2(bridge_slave_1) entered disabled state [ 2805.064497] device bridge_slave_1 entered promiscuous mode [ 2805.083369] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2805.092382] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2805.113021] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2805.121392] team0: Port device team_slave_0 added [ 2805.126843] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2805.136847] team0: Port device team_slave_1 added [ 2805.142254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2805.149602] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2805.213688] device hsr_slave_0 entered promiscuous mode [ 2805.280367] device hsr_slave_1 entered promiscuous mode [ 2805.333074] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2805.340113] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2805.352420] bridge0: port 2(bridge_slave_1) entered blocking state [ 2805.358766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2805.365425] bridge0: port 1(bridge_slave_0) entered blocking state [ 2805.371811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2805.402564] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2805.408643] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2805.416657] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2805.427981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2805.435299] bridge0: port 1(bridge_slave_0) entered disabled state [ 2805.442743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2805.453254] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2805.459318] 8021q: adding VLAN 0 to HW filter on device team0 [ 2805.468136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2805.475924] bridge0: port 1(bridge_slave_0) entered blocking state [ 2805.482272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2805.497450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2805.505107] bridge0: port 2(bridge_slave_1) entered blocking state [ 2805.511464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2805.526027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2805.533622] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2805.546184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2805.558262] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2805.568275] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2805.578530] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2805.584987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2805.592588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2805.600169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2805.615603] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2805.626514] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2805.980585] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2806.203686] bridge0: port 2(bridge_slave_1) entered disabled state [ 2806.211417] bridge0: port 1(bridge_slave_0) entered disabled state 04:07:08 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:08 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:08 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce2"}, 0x4a) 04:07:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:08 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:09 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:09 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2806.555880] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:07:09 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2806.683341] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:07:09 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2806.828262] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:07:09 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:09 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338f8311529") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2806.995597] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2807.119138] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:07:09 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2807.264753] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2807.283405] EXT4-fs (loop2): unsupported descriptor size 0 [ 2807.380863] device bridge_slave_1 left promiscuous mode [ 2807.386423] bridge0: port 2(bridge_slave_1) entered disabled state [ 2807.451940] device bridge_slave_0 left promiscuous mode [ 2807.457463] bridge0: port 1(bridge_slave_0) entered disabled state [ 2807.535235] device bridge_slave_1 left promiscuous mode [ 2807.554256] bridge0: port 2(bridge_slave_1) entered disabled state [ 2807.610882] device bridge_slave_0 left promiscuous mode [ 2807.616382] bridge0: port 1(bridge_slave_0) entered disabled state [ 2807.681355] device bridge_slave_1 left promiscuous mode [ 2807.686800] bridge0: port 2(bridge_slave_1) entered disabled state [ 2807.750992] device bridge_slave_0 left promiscuous mode [ 2807.756540] bridge0: port 1(bridge_slave_0) entered disabled state [ 2807.791689] device bridge_slave_1 left promiscuous mode [ 2807.797158] bridge0: port 2(bridge_slave_1) entered disabled state [ 2807.860873] device bridge_slave_0 left promiscuous mode [ 2807.866330] bridge0: port 1(bridge_slave_0) entered disabled state [ 2808.003624] device hsr_slave_1 left promiscuous mode [ 2808.042562] device hsr_slave_0 left promiscuous mode [ 2808.082779] team0 (unregistering): Port device team_slave_1 removed [ 2808.092922] team0 (unregistering): Port device team_slave_0 removed [ 2808.102032] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2808.164251] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2808.242128] bond0 (unregistering): Released all slaves [ 2808.322537] device hsr_slave_1 left promiscuous mode [ 2808.374010] device hsr_slave_0 left promiscuous mode [ 2808.414274] team0 (unregistering): Port device team_slave_1 removed [ 2808.423953] team0 (unregistering): Port device team_slave_0 removed [ 2808.433214] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2808.474935] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2808.550137] bond0 (unregistering): Released all slaves [ 2808.632343] device hsr_slave_1 left promiscuous mode [ 2808.673660] device hsr_slave_0 left promiscuous mode [ 2808.714411] team0 (unregistering): Port device team_slave_1 removed [ 2808.728887] team0 (unregistering): Port device team_slave_0 removed [ 2808.739984] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2808.774075] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2808.852035] bond0 (unregistering): Released all slaves [ 2808.942606] device hsr_slave_1 left promiscuous mode [ 2809.012507] device hsr_slave_0 left promiscuous mode [ 2809.064122] team0 (unregistering): Port device team_slave_1 removed [ 2809.073412] team0 (unregistering): Port device team_slave_0 removed [ 2809.084503] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2809.144521] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2809.221928] bond0 (unregistering): Released all slaves [ 2813.030840] IPVS: ftp: loaded support on port[0] = 21 [ 2813.921074] chnl_net:caif_netlink_parms(): no params data found [ 2813.922813] IPVS: ftp: loaded support on port[0] = 21 [ 2813.960472] bridge0: port 1(bridge_slave_0) entered blocking state [ 2813.966888] bridge0: port 1(bridge_slave_0) entered disabled state [ 2813.974141] device bridge_slave_0 entered promiscuous mode [ 2813.980963] bridge0: port 2(bridge_slave_1) entered blocking state [ 2813.987341] bridge0: port 2(bridge_slave_1) entered disabled state [ 2813.994256] device bridge_slave_1 entered promiscuous mode [ 2814.009203] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2814.018206] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2814.035495] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2814.042698] team0: Port device team_slave_0 added [ 2814.049605] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2814.056673] team0: Port device team_slave_1 added [ 2814.061920] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2814.076136] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2814.152860] device hsr_slave_0 entered promiscuous mode [ 2814.200339] device hsr_slave_1 entered promiscuous mode [ 2814.270546] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2814.279266] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2814.303159] bridge0: port 2(bridge_slave_1) entered blocking state [ 2814.309570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2814.316171] bridge0: port 1(bridge_slave_0) entered blocking state [ 2814.322508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2814.343593] IPVS: ftp: loaded support on port[0] = 21 [ 2814.374289] chnl_net:caif_netlink_parms(): no params data found [ 2814.418034] IPVS: ftp: loaded support on port[0] = 21 [ 2814.458390] bridge0: port 1(bridge_slave_0) entered blocking state [ 2814.465363] bridge0: port 1(bridge_slave_0) entered disabled state [ 2814.472787] device bridge_slave_0 entered promiscuous mode [ 2814.509784] bridge0: port 2(bridge_slave_1) entered blocking state [ 2814.516573] bridge0: port 2(bridge_slave_1) entered disabled state [ 2814.523550] device bridge_slave_1 entered promiscuous mode [ 2814.544412] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2814.557229] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2814.565007] chnl_net:caif_netlink_parms(): no params data found [ 2814.594479] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2814.601791] team0: Port device team_slave_0 added [ 2814.609077] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2814.616763] team0: Port device team_slave_1 added [ 2814.631527] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2814.653563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2814.667294] bridge0: port 1(bridge_slave_0) entered blocking state [ 2814.667721] IPVS: ftp: loaded support on port[0] = 21 [ 2814.673793] bridge0: port 1(bridge_slave_0) entered disabled state [ 2814.674587] device bridge_slave_0 entered promiscuous mode [ 2814.692716] bridge0: port 2(bridge_slave_1) entered blocking state [ 2814.699054] bridge0: port 2(bridge_slave_1) entered disabled state [ 2814.706289] device bridge_slave_1 entered promiscuous mode [ 2814.732242] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2814.738314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2814.754632] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2814.803645] device hsr_slave_0 entered promiscuous mode [ 2814.840456] device hsr_slave_1 entered promiscuous mode [ 2814.880821] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2814.891526] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2814.898575] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2814.913578] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2814.931226] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2814.938281] team0: Port device team_slave_0 added [ 2814.955898] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2814.963714] team0: Port device team_slave_1 added [ 2814.971378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2814.978383] bridge0: port 1(bridge_slave_0) entered disabled state [ 2814.985184] bridge0: port 2(bridge_slave_1) entered disabled state [ 2814.992280] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2815.007866] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2815.015481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2815.032700] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2815.038783] 8021q: adding VLAN 0 to HW filter on device team0 [ 2815.093201] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2815.132388] device hsr_slave_0 entered promiscuous mode [ 2815.190542] device hsr_slave_1 entered promiscuous mode [ 2815.251022] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2815.267554] chnl_net:caif_netlink_parms(): no params data found [ 2815.278830] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2815.286195] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2815.298381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2815.308310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2815.315936] bridge0: port 1(bridge_slave_0) entered blocking state [ 2815.322302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2815.345258] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2815.395632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2815.403630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2815.411403] bridge0: port 2(bridge_slave_1) entered blocking state [ 2815.417852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2815.426959] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2815.443385] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2815.464802] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2815.477646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2815.486287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2815.502088] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2815.522798] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2815.529626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2815.537384] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2815.545076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2815.552716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2815.560338] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2815.576399] bridge0: port 1(bridge_slave_0) entered blocking state [ 2815.583517] bridge0: port 1(bridge_slave_0) entered disabled state [ 2815.590982] device bridge_slave_0 entered promiscuous mode [ 2815.597532] bridge0: port 2(bridge_slave_1) entered blocking state [ 2815.604099] bridge0: port 2(bridge_slave_1) entered disabled state [ 2815.611320] device bridge_slave_1 entered promiscuous mode [ 2815.622691] chnl_net:caif_netlink_parms(): no params data found [ 2815.648216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2815.659619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2815.668546] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2815.678091] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2815.687400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2815.697181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2815.708955] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2815.729216] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2815.739383] team0: Port device team_slave_0 added [ 2815.746007] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2815.758593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2815.766716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2815.775499] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2815.781795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2815.794325] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2815.803216] team0: Port device team_slave_1 added [ 2815.809063] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2815.826006] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2815.833581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2815.840734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2815.849980] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2815.856278] 8021q: adding VLAN 0 to HW filter on device team0 [ 2815.867852] bridge0: port 1(bridge_slave_0) entered blocking state [ 2815.874800] bridge0: port 1(bridge_slave_0) entered disabled state [ 2815.882039] device bridge_slave_0 entered promiscuous mode [ 2815.888803] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2815.907075] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2815.915173] bridge0: port 2(bridge_slave_1) entered blocking state [ 2815.921755] bridge0: port 2(bridge_slave_1) entered disabled state [ 2815.928610] device bridge_slave_1 entered promiscuous mode [ 2815.951012] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2815.959186] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2815.967101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2815.974703] bridge0: port 1(bridge_slave_0) entered blocking state [ 2815.981111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2815.988357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2815.998289] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2816.007331] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2816.073769] device hsr_slave_0 entered promiscuous mode [ 2816.110380] device hsr_slave_1 entered promiscuous mode [ 2816.162606] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2816.169788] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2816.178214] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2816.188320] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2816.196077] team0: Port device team_slave_0 added [ 2816.204634] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2816.221991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2816.229716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2816.237668] bridge0: port 2(bridge_slave_1) entered blocking state [ 2816.244026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2816.253752] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2816.261867] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2816.276542] team0: Port device team_slave_1 added [ 2816.281882] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2816.289156] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2816.301731] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2816.318688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2816.329003] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2816.353215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2816.402241] device hsr_slave_0 entered promiscuous mode [ 2816.441036] device hsr_slave_1 entered promiscuous mode [ 2816.484234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2816.495493] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2816.503936] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2816.510844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2816.518363] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2816.526060] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2816.535505] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2816.544023] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2816.557789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2816.570636] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2816.578518] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2816.586545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2816.594585] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2816.603817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2816.610929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2816.617933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2816.625810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2816.638783] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2816.649029] 8021q: adding VLAN 0 to HW filter on device team0 [ 2816.661729] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2816.675414] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2816.686818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2816.702806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2816.710409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2816.718576] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2816.725205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2816.851677] bridge0: port 2(bridge_slave_1) entered disabled state [ 2816.859535] bridge0: port 1(bridge_slave_0) entered disabled state [ 2817.074247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2817.083897] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2817.091352] device bridge_slave_1 left promiscuous mode [ 2817.096830] bridge0: port 2(bridge_slave_1) entered disabled state [ 2817.130701] device bridge_slave_0 left promiscuous mode [ 2817.136160] bridge0: port 1(bridge_slave_0) entered disabled state [ 2817.222321] device hsr_slave_1 left promiscuous mode [ 2817.263960] device hsr_slave_0 left promiscuous mode [ 2817.304170] team0 (unregistering): Port device team_slave_1 removed [ 2817.313845] team0 (unregistering): Port device team_slave_0 removed [ 2817.324146] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2817.365115] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2817.442432] bond0 (unregistering): Released all slaves [ 2817.487757] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2817.495277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2817.505266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2817.513417] bridge0: port 1(bridge_slave_0) entered blocking state [ 2817.519748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2817.526916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2817.535406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2817.543191] bridge0: port 2(bridge_slave_1) entered blocking state [ 2817.549703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2817.557257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2817.573098] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2817.582571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2817.593439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2817.600398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2817.607329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2817.617872] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2817.626399] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2817.644010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2817.652470] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2817.658558] 8021q: adding VLAN 0 to HW filter on device team0 [ 2817.666266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2817.692769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2817.707645] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2817.714888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2817.735163] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2817.743902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2817.751744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2817.759350] bridge0: port 1(bridge_slave_0) entered blocking state [ 2817.765744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2817.772894] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2817.779759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2817.793726] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2817.803135] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2817.813052] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2817.819162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2817.827344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2817.835323] bridge0: port 2(bridge_slave_1) entered blocking state [ 2817.841707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2817.851043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2817.860331] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2817.868670] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2817.878215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2817.889608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2817.897813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2817.905905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2817.913049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2817.962560] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2817.970391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2817.977857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2817.988823] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2817.995135] 8021q: adding VLAN 0 to HW filter on device team0 [ 2818.394563] bridge0: port 2(bridge_slave_1) entered disabled state [ 2818.403933] bridge0: port 1(bridge_slave_0) entered disabled state [ 2818.757391] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2818.773528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2818.784722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2818.793835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2818.803783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2818.811241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2818.818802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2818.826796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2818.834732] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2818.843307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2818.854359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2818.864192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2818.872474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2818.880865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2818.888461] bridge0: port 1(bridge_slave_0) entered blocking state [ 2818.894848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2818.910634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2818.918224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2818.925990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2818.933589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2818.942616] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2818.948628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2818.957855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2818.969376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2818.977782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2818.985663] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2818.994465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2819.004472] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2819.017113] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2819.030116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2819.037626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2819.046035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2819.053661] bridge0: port 2(bridge_slave_1) entered blocking state [ 2819.059999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2819.067537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2819.086054] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2819.094764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2819.114991] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2819.122823] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2819.134546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2819.144017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2819.153510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2819.162224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2819.169836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2819.179033] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2819.187222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2819.195370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2819.204990] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2819.223241] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2819.233478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2819.244531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2819.255993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2819.264186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2819.275299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2819.284244] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2819.295211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2819.321262] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2819.336724] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2819.918298] bridge0: port 2(bridge_slave_1) entered disabled state [ 2819.926855] bridge0: port 1(bridge_slave_0) entered disabled state [ 2820.323860] bridge0: port 2(bridge_slave_1) entered disabled state [ 2820.332091] bridge0: port 1(bridge_slave_0) entered disabled state 04:07:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:23 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:23 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:23 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2820.669700] bridge0: port 2(bridge_slave_1) entered disabled state [ 2820.676618] bridge0: port 1(bridge_slave_0) entered disabled state [ 2820.689320] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2820.703562] EXT4-fs (loop2): unsupported descriptor size 0 04:07:23 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:23 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:23 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:23 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:23 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:23 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2820.923523] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2820.952698] EXT4-fs (loop2): unsupported descriptor size 0 04:07:23 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:23 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:23 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2821.128849] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2821.138612] EXT4-fs (loop2): unsupported descriptor size 0 [ 2821.660511] device bridge_slave_1 left promiscuous mode [ 2821.666253] bridge0: port 2(bridge_slave_1) entered disabled state [ 2821.720867] device bridge_slave_0 left promiscuous mode [ 2821.726411] bridge0: port 1(bridge_slave_0) entered disabled state [ 2821.801347] device bridge_slave_1 left promiscuous mode [ 2821.806819] bridge0: port 2(bridge_slave_1) entered disabled state [ 2821.851071] device bridge_slave_0 left promiscuous mode [ 2821.856553] bridge0: port 1(bridge_slave_0) entered disabled state [ 2821.953122] device hsr_slave_1 left promiscuous mode [ 2821.992706] device hsr_slave_0 left promiscuous mode [ 2822.053464] team0 (unregistering): Port device team_slave_1 removed [ 2822.064109] team0 (unregistering): Port device team_slave_0 removed [ 2822.074164] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2822.112911] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2822.193706] bond0 (unregistering): Released all slaves [ 2822.321894] device hsr_slave_1 left promiscuous mode [ 2822.374894] device hsr_slave_0 left promiscuous mode [ 2822.423632] team0 (unregistering): Port device team_slave_1 removed [ 2822.433873] team0 (unregistering): Port device team_slave_0 removed [ 2822.445569] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2822.473944] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2822.551912] bond0 (unregistering): Released all slaves [ 2824.971364] IPVS: ftp: loaded support on port[0] = 21 [ 2826.142649] IPVS: ftp: loaded support on port[0] = 21 [ 2826.214150] chnl_net:caif_netlink_parms(): no params data found [ 2826.242212] IPVS: ftp: loaded support on port[0] = 21 [ 2826.310863] bridge0: port 1(bridge_slave_0) entered blocking state [ 2826.317593] bridge0: port 1(bridge_slave_0) entered disabled state [ 2826.324959] device bridge_slave_0 entered promiscuous mode [ 2826.333730] bridge0: port 2(bridge_slave_1) entered blocking state [ 2826.340222] bridge0: port 2(bridge_slave_1) entered disabled state [ 2826.347117] device bridge_slave_1 entered promiscuous mode [ 2826.362537] chnl_net:caif_netlink_parms(): no params data found [ 2826.394439] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2826.403850] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2826.439563] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2826.446924] team0: Port device team_slave_0 added [ 2826.465625] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2826.472893] team0: Port device team_slave_1 added [ 2826.479149] IPVS: ftp: loaded support on port[0] = 21 [ 2826.493825] bridge0: port 1(bridge_slave_0) entered blocking state [ 2826.500337] bridge0: port 1(bridge_slave_0) entered disabled state [ 2826.507574] device bridge_slave_0 entered promiscuous mode [ 2826.514684] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2826.552294] bridge0: port 2(bridge_slave_1) entered blocking state [ 2826.559083] bridge0: port 2(bridge_slave_1) entered disabled state [ 2826.566079] device bridge_slave_1 entered promiscuous mode [ 2826.572427] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2826.615149] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2826.672370] device hsr_slave_0 entered promiscuous mode [ 2826.730422] device hsr_slave_1 entered promiscuous mode [ 2826.784889] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2826.801577] chnl_net:caif_netlink_parms(): no params data found [ 2826.815248] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2826.825348] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2826.836014] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2826.844306] team0: Port device team_slave_0 added [ 2826.852044] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2826.859209] team0: Port device team_slave_1 added [ 2826.869813] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2826.884386] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2826.917984] bridge0: port 2(bridge_slave_1) entered blocking state [ 2826.924463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2826.931078] bridge0: port 1(bridge_slave_0) entered blocking state [ 2826.937415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2826.994247] device hsr_slave_0 entered promiscuous mode [ 2827.040388] device hsr_slave_1 entered promiscuous mode [ 2827.080821] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2827.088161] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2827.123470] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.129848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2827.136473] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.142939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2827.161942] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.168493] bridge0: port 1(bridge_slave_0) entered disabled state [ 2827.176692] device bridge_slave_0 entered promiscuous mode [ 2827.203838] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.213531] bridge0: port 2(bridge_slave_1) entered disabled state [ 2827.221175] device bridge_slave_1 entered promiscuous mode [ 2827.277246] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2827.288463] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2827.304203] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2827.317590] bridge0: port 1(bridge_slave_0) entered disabled state [ 2827.329482] bridge0: port 2(bridge_slave_1) entered disabled state [ 2827.336522] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2827.344667] bridge0: port 1(bridge_slave_0) entered disabled state [ 2827.351607] bridge0: port 2(bridge_slave_1) entered disabled state [ 2827.361461] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2827.370478] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2827.377543] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2827.385682] chnl_net:caif_netlink_parms(): no params data found [ 2827.396296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2827.403496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2827.416996] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2827.423545] 8021q: adding VLAN 0 to HW filter on device team0 [ 2827.459657] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2827.466853] team0: Port device team_slave_0 added [ 2827.472782] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2827.479814] team0: Port device team_slave_1 added [ 2827.499528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2827.509050] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2827.525984] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.533023] bridge0: port 1(bridge_slave_0) entered disabled state [ 2827.539866] device bridge_slave_0 entered promiscuous mode [ 2827.546837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2827.557548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2827.565212] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.571610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2827.580399] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2827.589329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2827.596952] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.603386] bridge0: port 2(bridge_slave_1) entered disabled state [ 2827.610422] device bridge_slave_1 entered promiscuous mode [ 2827.633178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2827.641001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2827.648511] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.654883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2827.664687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2827.682924] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2827.693077] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2827.701176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2827.710766] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2827.718109] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2827.772430] device hsr_slave_0 entered promiscuous mode [ 2827.810534] device hsr_slave_1 entered promiscuous mode [ 2827.885424] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2827.894815] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2827.901442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2827.918312] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2827.927400] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2827.937463] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2827.944912] team0: Port device team_slave_0 added [ 2827.950545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2827.957434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2827.967697] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2827.974380] 8021q: adding VLAN 0 to HW filter on device team0 [ 2827.981484] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2827.990481] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2827.997789] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2828.005104] team0: Port device team_slave_1 added [ 2828.010912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2828.018139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2828.026220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2828.033851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2828.041570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2828.049209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2828.056859] bridge0: port 1(bridge_slave_0) entered blocking state [ 2828.063255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2828.072746] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2828.090561] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2828.101019] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2828.107950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2828.115728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2828.125578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2828.139012] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2828.149042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2828.156779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2828.164211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2828.172354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2828.179896] bridge0: port 2(bridge_slave_1) entered blocking state [ 2828.186270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2828.195346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2828.243850] device hsr_slave_0 entered promiscuous mode [ 2828.280497] device hsr_slave_1 entered promiscuous mode [ 2828.322852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2828.330846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2828.338345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2828.349095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2828.357669] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2828.366411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2828.381299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2828.389117] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2828.402011] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2828.408007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2828.421487] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2828.431731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2828.441303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2828.448845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2828.457011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2828.464714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2828.477654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2828.486241] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2828.493288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2828.500690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2828.509660] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2828.521040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2828.529612] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2828.541128] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2828.547138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2828.556700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2828.564320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2828.575115] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2828.585258] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2828.592731] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2828.602033] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2828.616213] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2828.624274] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2828.637788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2828.644760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2828.651976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2828.662466] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2828.668539] 8021q: adding VLAN 0 to HW filter on device team0 [ 2828.694398] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2828.704648] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2828.713209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2828.721477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2828.729310] bridge0: port 1(bridge_slave_0) entered blocking state [ 2828.735692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2828.743046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2828.751249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2828.758808] bridge0: port 2(bridge_slave_1) entered blocking state [ 2828.765183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2828.772451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2828.793796] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2828.806483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2828.816841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2828.826658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2828.843215] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2828.850500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2828.860983] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2828.873831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2828.888982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2828.903282] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2828.914975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2828.925923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2828.935166] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2828.945672] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2828.957696] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2828.979530] bridge0: port 2(bridge_slave_1) entered disabled state [ 2828.986198] bridge0: port 1(bridge_slave_0) entered disabled state [ 2829.019527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2829.030943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2829.038288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2829.046564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2829.058259] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2829.175175] bridge0: port 2(bridge_slave_1) entered disabled state [ 2829.184308] bridge0: port 1(bridge_slave_0) entered disabled state 04:07:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) clock_gettime(0x0, 0x0) 04:07:31 executing program 4: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:31 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2829.378636] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2829.385011] 8021q: adding VLAN 0 to HW filter on device team0 [ 2829.392062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2829.399556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 04:07:31 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2829.424218] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2829.431394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2829.452385] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2829.472565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2829.489990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2829.514042] bridge0: port 1(bridge_slave_0) entered blocking state [ 2829.520445] bridge0: port 1(bridge_slave_0) entered forwarding state 04:07:32 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2829.544000] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2829.562859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2829.576717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2829.589414] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2829.602652] EXT4-fs (loop2): unsupported descriptor size 0 [ 2829.610960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2829.632440] bridge0: port 2(bridge_slave_1) entered blocking state 04:07:32 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2829.638818] bridge0: port 2(bridge_slave_1) entered forwarding state 04:07:32 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2829.671764] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2829.682879] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2829.709625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 04:07:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000280)=@newsa={0x138, 0x10, 0x40d, 0x0, 0x0, {{@in=@dev, @in=@empty}, {@in6=@loopback, 0x0, 0x6c}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) [ 2829.722341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2829.736409] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2829.747276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2829.763262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2829.785778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2829.799584] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2829.825122] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2829.840931] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2829.856502] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2829.864833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2829.879328] EXT4-fs (loop2): unsupported descriptor size 0 [ 2829.889529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2829.909991] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2829.927972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2829.938464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2829.951627] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2829.959477] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2829.986330] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2830.004866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2830.024141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2830.038297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2830.060932] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2830.094555] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2830.364162] bridge0: port 2(bridge_slave_1) entered disabled state [ 2830.372694] bridge0: port 1(bridge_slave_0) entered disabled state [ 2831.140576] device bridge_slave_1 left promiscuous mode [ 2831.146192] bridge0: port 2(bridge_slave_1) entered disabled state [ 2831.191045] device bridge_slave_0 left promiscuous mode [ 2831.196614] bridge0: port 1(bridge_slave_0) entered disabled state [ 2831.241116] device bridge_slave_1 left promiscuous mode [ 2831.246666] bridge0: port 2(bridge_slave_1) entered disabled state [ 2831.300705] device bridge_slave_0 left promiscuous mode [ 2831.306398] bridge0: port 1(bridge_slave_0) entered disabled state [ 2831.361072] device bridge_slave_1 left promiscuous mode [ 2831.366632] bridge0: port 2(bridge_slave_1) entered disabled state [ 2831.400812] device bridge_slave_0 left promiscuous mode [ 2831.406337] bridge0: port 1(bridge_slave_0) entered disabled state [ 2831.521677] device hsr_slave_1 left promiscuous mode [ 2831.573938] device hsr_slave_0 left promiscuous mode [ 2831.622908] team0 (unregistering): Port device team_slave_1 removed [ 2831.632996] team0 (unregistering): Port device team_slave_0 removed [ 2831.642424] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2831.694902] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2831.773824] bond0 (unregistering): Released all slaves [ 2831.872614] device hsr_slave_1 left promiscuous mode [ 2831.912879] device hsr_slave_0 left promiscuous mode [ 2831.952993] team0 (unregistering): Port device team_slave_1 removed [ 2831.963265] team0 (unregistering): Port device team_slave_0 removed [ 2831.972743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2832.010160] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2832.093510] bond0 (unregistering): Released all slaves [ 2832.192032] device hsr_slave_1 left promiscuous mode [ 2832.234241] device hsr_slave_0 left promiscuous mode [ 2832.274472] team0 (unregistering): Port device team_slave_1 removed [ 2832.284361] team0 (unregistering): Port device team_slave_0 removed [ 2832.294124] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2832.333860] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2832.393497] bond0 (unregistering): Released all slaves 04:07:35 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:35 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:35 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2832.465590] bridge0: port 2(bridge_slave_1) entered disabled state [ 2832.472248] bridge0: port 1(bridge_slave_0) entered disabled state 04:07:35 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2832.569174] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2832.595909] EXT4-fs (loop2): unsupported descriptor size 0 04:07:35 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2832.772736] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2832.795351] EXT4-fs (loop2): unsupported descriptor size 0 [ 2836.100838] IPVS: ftp: loaded support on port[0] = 21 [ 2837.083326] IPVS: ftp: loaded support on port[0] = 21 [ 2837.106006] chnl_net:caif_netlink_parms(): no params data found [ 2837.154070] IPVS: ftp: loaded support on port[0] = 21 [ 2837.170849] bridge0: port 1(bridge_slave_0) entered blocking state [ 2837.177239] bridge0: port 1(bridge_slave_0) entered disabled state [ 2837.184406] device bridge_slave_0 entered promiscuous mode [ 2837.193294] bridge0: port 2(bridge_slave_1) entered blocking state [ 2837.199671] bridge0: port 2(bridge_slave_1) entered disabled state [ 2837.207179] device bridge_slave_1 entered promiscuous mode [ 2837.231399] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2837.240291] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2837.264987] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2837.275182] team0: Port device team_slave_0 added [ 2837.288157] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2837.295553] team0: Port device team_slave_1 added [ 2837.300972] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2837.317459] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2837.338953] IPVS: ftp: loaded support on port[0] = 21 [ 2837.404432] device hsr_slave_0 entered promiscuous mode [ 2837.470319] device hsr_slave_1 entered promiscuous mode [ 2837.523118] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2837.546729] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2837.582238] chnl_net:caif_netlink_parms(): no params data found [ 2837.595178] bridge0: port 2(bridge_slave_1) entered blocking state [ 2837.601544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2837.608094] bridge0: port 1(bridge_slave_0) entered blocking state [ 2837.614488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2837.746918] IPVS: ftp: loaded support on port[0] = 21 [ 2837.759611] bridge0: port 1(bridge_slave_0) entered blocking state [ 2837.766058] bridge0: port 1(bridge_slave_0) entered disabled state [ 2837.773018] device bridge_slave_0 entered promiscuous mode [ 2837.779287] chnl_net:caif_netlink_parms(): no params data found [ 2837.797006] bridge0: port 2(bridge_slave_1) entered blocking state [ 2837.803634] bridge0: port 2(bridge_slave_1) entered disabled state [ 2837.810666] device bridge_slave_1 entered promiscuous mode [ 2837.838453] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2837.909125] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2837.933030] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2837.940211] team0: Port device team_slave_0 added [ 2837.951058] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2837.958157] team0: Port device team_slave_1 added [ 2837.979438] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2837.987406] chnl_net:caif_netlink_parms(): no params data found [ 2838.009487] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2838.059874] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2838.066456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2838.085076] bridge0: port 1(bridge_slave_0) entered blocking state [ 2838.092604] bridge0: port 1(bridge_slave_0) entered disabled state [ 2838.099453] device bridge_slave_0 entered promiscuous mode [ 2838.106266] bridge0: port 2(bridge_slave_1) entered blocking state [ 2838.112671] bridge0: port 2(bridge_slave_1) entered disabled state [ 2838.119536] device bridge_slave_1 entered promiscuous mode [ 2838.182685] device hsr_slave_0 entered promiscuous mode [ 2838.220457] device hsr_slave_1 entered promiscuous mode [ 2838.270662] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2838.284975] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2838.297634] bridge0: port 1(bridge_slave_0) entered disabled state [ 2838.304435] bridge0: port 2(bridge_slave_1) entered disabled state [ 2838.312407] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2838.335571] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2838.361745] bridge0: port 1(bridge_slave_0) entered blocking state [ 2838.368097] bridge0: port 1(bridge_slave_0) entered disabled state [ 2838.379885] device bridge_slave_0 entered promiscuous mode [ 2838.387458] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2838.400833] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2838.434442] bridge0: port 2(bridge_slave_1) entered blocking state [ 2838.445763] bridge0: port 2(bridge_slave_1) entered disabled state [ 2838.453029] device bridge_slave_1 entered promiscuous mode [ 2838.459111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2838.470635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2838.479778] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2838.490973] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2838.500197] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2838.506267] 8021q: adding VLAN 0 to HW filter on device team0 [ 2838.554640] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2838.565846] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2838.585680] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2838.593775] team0: Port device team_slave_0 added [ 2838.599286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2838.607127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2838.614859] bridge0: port 1(bridge_slave_0) entered blocking state [ 2838.621252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2838.628037] chnl_net:caif_netlink_parms(): no params data found [ 2838.641012] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2838.648824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2838.664054] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2838.671354] team0: Port device team_slave_1 added [ 2838.676733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2838.684581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2838.692289] bridge0: port 2(bridge_slave_1) entered blocking state [ 2838.698616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2838.712111] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2838.727582] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2838.735939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2838.754774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2838.763311] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2838.773498] team0: Port device team_slave_0 added [ 2838.779709] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2838.787108] team0: Port device team_slave_1 added [ 2838.792652] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2838.799812] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2838.822844] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2838.883975] device hsr_slave_0 entered promiscuous mode [ 2838.920381] device hsr_slave_1 entered promiscuous mode [ 2838.975806] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2838.989090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2839.001209] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2839.010608] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2839.026330] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2839.046429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2839.054289] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2839.062009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2839.069522] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2839.077315] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2839.086147] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2839.146060] device hsr_slave_0 entered promiscuous mode [ 2839.200519] device hsr_slave_1 entered promiscuous mode [ 2839.250616] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2839.259265] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2839.273948] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.280919] bridge0: port 1(bridge_slave_0) entered disabled state [ 2839.287753] device bridge_slave_0 entered promiscuous mode [ 2839.297223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2839.304996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2839.314668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2839.322246] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2839.331441] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.338748] bridge0: port 2(bridge_slave_1) entered disabled state [ 2839.346796] device bridge_slave_1 entered promiscuous mode [ 2839.358009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2839.366369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2839.389758] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2839.396751] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2839.407345] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2839.418768] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2839.428374] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2839.457700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2839.483140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2839.491754] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2839.499145] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2839.506206] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2839.514512] team0: Port device team_slave_0 added [ 2839.521259] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2839.528273] team0: Port device team_slave_1 added [ 2839.537236] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2839.545243] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2839.554963] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2839.565126] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2839.580933] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2839.589637] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2839.595907] 8021q: adding VLAN 0 to HW filter on device team0 [ 2839.603916] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2839.616862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2839.624434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2839.631592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2839.638307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2839.663407] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2839.703040] device hsr_slave_0 entered promiscuous mode [ 2839.740283] device hsr_slave_1 entered promiscuous mode [ 2839.780642] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2839.787803] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2839.796672] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2839.802822] 8021q: adding VLAN 0 to HW filter on device team0 [ 2839.809091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2839.816892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2839.824422] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.830792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2839.838073] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2839.861813] bridge0: port 2(bridge_slave_1) entered disabled state [ 2839.868329] bridge0: port 1(bridge_slave_0) entered disabled state 04:07:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x1) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="73797a315582c8a4dcd494573b9f7646b2038b4f77727899757381d2fe1fba78afde1e976a744666b58529a520f48345679cffffffff52b773ce07c427de2dd20724b74a4029e24cc029c6e1d12e5fabf9468173481cfd6c53c9871417ec690da51e25"], 0x63) 04:07:42 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2839.911026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2839.918243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2839.928467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2839.939967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2839.954487] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.960887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2839.976742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2839.988341] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2839.996927] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2840.022122] EXT4-fs (loop2): unsupported descriptor size 0 [ 2840.027826] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2840.044205] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2840.050595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2840.058251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2840.066137] bridge0: port 1(bridge_slave_0) entered blocking state [ 2840.072510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2840.079954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2840.089325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2840.102019] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 04:07:42 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2840.123796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2840.138831] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2840.155968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2840.168349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2840.180631] bridge0: port 2(bridge_slave_1) entered blocking state [ 2840.187025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2840.194252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2840.202155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2840.207571] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended 04:07:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x1) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="0ada4fd7eeac4d6d09dff7dcb7ac2c6036c6b6582b641bf1565c152c05c3781ae9a2e32f65db7e5f78b5e6cf35573974f3bd3601eada7d44150cecf3779c6b54463ba9f05450a7a2481b07288491c19df809dfaeb39e664ee86ef0ab"], 0x5c) [ 2840.210581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2840.228228] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2840.232252] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2840.247112] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2840.255492] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 04:07:42 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2840.290731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2840.299553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2840.315076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2840.336146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2840.344266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2840.358820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2840.372059] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2840.382143] 8021q: adding VLAN 0 to HW filter on device team0 [ 2840.388095] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2840.392203] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2840.397081] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2840.418340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2840.426663] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2840.435614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2840.447974] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2840.457972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2840.468810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2840.489066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2840.500632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2840.508041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2840.517176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2840.524916] bridge0: port 1(bridge_slave_0) entered blocking state [ 2840.531286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2840.538039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2840.545641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2840.554212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2840.561245] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2840.568648] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2840.577081] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2840.587844] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2840.594044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2840.602855] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2840.617031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2840.625909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2840.638329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2840.645988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2840.653005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2840.659749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2840.667769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2840.675467] bridge0: port 2(bridge_slave_1) entered blocking state [ 2840.681840] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2840.693845] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2840.701995] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2840.708049] 8021q: adding VLAN 0 to HW filter on device team0 [ 2840.721466] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2840.735364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2840.742338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2840.750822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2840.758326] bridge0: port 1(bridge_slave_0) entered blocking state [ 2840.764694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2840.771567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2840.779116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2840.786966] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2840.794932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2840.803698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2840.814557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2840.823388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2840.831035] bridge0: port 2(bridge_slave_1) entered blocking state [ 2840.837507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2840.845034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2840.856395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2840.865744] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2840.874592] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2840.881696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2840.889325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2840.899134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2840.908718] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2840.929653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2840.937603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2840.946695] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2840.956340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2840.966149] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2840.980710] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2840.988572] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2841.001472] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2841.007507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2841.014660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2841.024058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2841.031834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2841.039495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2841.047315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2841.054850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2841.064569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2841.078624] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2841.085151] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2841.092341] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2841.099161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2841.106801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2841.120674] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2841.128857] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2841.146556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2841.155275] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2841.163198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2841.171081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2841.188321] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 04:07:43 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2841.196850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2841.214768] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2841.222372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2841.229878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2841.237499] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2841.245547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2841.257335] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2841.267827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2841.276776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2841.287854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2841.295518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2841.316201] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2841.322824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2841.335713] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2841.347499] 8021q: adding VLAN 0 to HW filter on device batadv0 04:07:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000000)=[{}, {r1}], 0x200000000000000d, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) open_by_handle_at(r3, &(0x7f0000000000)={0x8, 0x1}, 0x0) 04:07:43 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000012d6405000000000065040400010000000704000001000000b7050000000000006a0a00fe000000008500000062000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2841.373457] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2841.407035] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2841.535295] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2841.566860] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2842.102883] bridge0: port 2(bridge_slave_1) entered disabled state [ 2842.111538] bridge0: port 1(bridge_slave_0) entered disabled state [ 2842.505039] bridge0: port 2(bridge_slave_1) entered disabled state [ 2842.512822] bridge0: port 1(bridge_slave_0) entered disabled state 04:07:45 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:45 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x1c, r1, 0x3, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000005001) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000005001) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x101}, 0x14}}, 0x0) 04:07:45 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:45 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0xf7) 04:07:45 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d64") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:45 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:45 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000006c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x1c, r1, 0x3, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000005001) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000005001) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x101}, 0x14}}, 0x0) 04:07:45 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) clock_gettime(0x0, &(0x7f00000005c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 04:07:45 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2842.930976] device bridge_slave_1 left promiscuous mode [ 2842.936514] bridge0: port 2(bridge_slave_1) entered disabled state 04:07:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) clock_gettime(0x0, &(0x7f00000005c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) [ 2842.987025] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2843.011096] device bridge_slave_0 left promiscuous mode [ 2843.018093] bridge0: port 1(bridge_slave_0) entered disabled state [ 2843.036022] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:07:45 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = dup2(r0, 0xffffffffffffffff) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) clock_gettime(0x0, &(0x7f00000005c0)) openat$cgroup_ro(r2, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) [ 2843.083022] device bridge_slave_1 left promiscuous mode [ 2843.094617] bridge0: port 2(bridge_slave_1) entered disabled state 04:07:45 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d64") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2843.202035] device bridge_slave_0 left promiscuous mode [ 2843.207549] bridge0: port 1(bridge_slave_0) entered disabled state [ 2843.286957] device bridge_slave_1 left promiscuous mode [ 2843.296248] bridge0: port 2(bridge_slave_1) entered disabled state [ 2843.346356] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2843.362574] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2843.374802] device bridge_slave_0 left promiscuous mode [ 2843.400228] bridge0: port 1(bridge_slave_0) entered disabled state 04:07:45 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d64") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2843.458348] device bridge_slave_1 left promiscuous mode [ 2843.470472] bridge0: port 2(bridge_slave_1) entered disabled state [ 2843.520823] device bridge_slave_0 left promiscuous mode [ 2843.526314] bridge0: port 1(bridge_slave_0) entered disabled state [ 2843.537791] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2843.552875] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2843.613436] device hsr_slave_1 left promiscuous mode [ 2843.687234] device hsr_slave_0 left promiscuous mode [ 2843.729650] team0 (unregistering): Port device team_slave_1 removed [ 2843.768985] team0 (unregistering): Port device team_slave_0 removed [ 2843.799926] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2843.844044] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2843.954977] bond0 (unregistering): Released all slaves [ 2844.082695] device hsr_slave_1 left promiscuous mode [ 2844.133323] device hsr_slave_0 left promiscuous mode [ 2844.183734] team0 (unregistering): Port device team_slave_1 removed [ 2844.202992] team0 (unregistering): Port device team_slave_0 removed [ 2844.218857] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2844.265542] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2844.365978] bond0 (unregistering): Released all slaves [ 2844.472743] device hsr_slave_1 left promiscuous mode [ 2844.513223] device hsr_slave_0 left promiscuous mode [ 2844.584236] team0 (unregistering): Port device team_slave_1 removed [ 2844.593788] team0 (unregistering): Port device team_slave_0 removed [ 2844.603272] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2844.673095] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2844.765203] bond0 (unregistering): Released all slaves [ 2844.882621] device hsr_slave_1 left promiscuous mode [ 2844.923012] device hsr_slave_0 left promiscuous mode [ 2844.984248] team0 (unregistering): Port device team_slave_1 removed [ 2844.993873] team0 (unregistering): Port device team_slave_0 removed [ 2845.004030] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2845.046780] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2845.106265] bond0 (unregistering): Released all slaves [ 2848.951316] IPVS: ftp: loaded support on port[0] = 21 [ 2849.911509] IPVS: ftp: loaded support on port[0] = 21 [ 2849.926474] chnl_net:caif_netlink_parms(): no params data found [ 2849.981180] bridge0: port 1(bridge_slave_0) entered blocking state [ 2849.987591] bridge0: port 1(bridge_slave_0) entered disabled state [ 2849.994541] device bridge_slave_0 entered promiscuous mode [ 2850.006871] bridge0: port 2(bridge_slave_1) entered blocking state [ 2850.013998] bridge0: port 2(bridge_slave_1) entered disabled state [ 2850.023203] device bridge_slave_1 entered promiscuous mode [ 2850.043192] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2850.052442] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2850.083590] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2850.094057] team0: Port device team_slave_0 added [ 2850.131329] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2850.138420] team0: Port device team_slave_1 added [ 2850.162655] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2850.174738] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2850.185223] chnl_net:caif_netlink_parms(): no params data found [ 2850.263876] device hsr_slave_0 entered promiscuous mode [ 2850.310450] device hsr_slave_1 entered promiscuous mode [ 2850.352984] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2850.366967] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2850.386120] bridge0: port 1(bridge_slave_0) entered blocking state [ 2850.393092] bridge0: port 1(bridge_slave_0) entered disabled state [ 2850.399941] device bridge_slave_0 entered promiscuous mode [ 2850.411647] bridge0: port 2(bridge_slave_1) entered blocking state [ 2850.418022] bridge0: port 2(bridge_slave_1) entered disabled state [ 2850.425736] device bridge_slave_1 entered promiscuous mode [ 2850.447052] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2850.457032] bridge0: port 2(bridge_slave_1) entered blocking state [ 2850.463393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2850.469952] bridge0: port 1(bridge_slave_0) entered blocking state [ 2850.476328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2850.485064] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2850.507218] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2850.514694] team0: Port device team_slave_0 added [ 2850.523584] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2850.530611] team0: Port device team_slave_1 added [ 2850.535907] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2850.543866] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2850.604302] device hsr_slave_0 entered promiscuous mode [ 2850.650335] device hsr_slave_1 entered promiscuous mode [ 2850.700674] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2850.707674] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2850.726935] bridge0: port 2(bridge_slave_1) entered blocking state [ 2850.733305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2850.739871] bridge0: port 1(bridge_slave_0) entered blocking state [ 2850.746242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2850.779941] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2850.786645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2850.796194] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2850.812017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2850.818988] bridge0: port 1(bridge_slave_0) entered disabled state [ 2850.826061] bridge0: port 2(bridge_slave_1) entered disabled state [ 2850.833551] bridge0: port 1(bridge_slave_0) entered disabled state [ 2850.840419] bridge0: port 2(bridge_slave_1) entered disabled state [ 2850.849263] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2850.855846] 8021q: adding VLAN 0 to HW filter on device team0 [ 2850.867188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2850.877391] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2850.884000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2850.891634] bridge0: port 1(bridge_slave_0) entered blocking state [ 2850.897977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2850.906558] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2850.914930] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2850.925031] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2850.931686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2850.939387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2850.947126] bridge0: port 2(bridge_slave_1) entered blocking state [ 2850.953497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2850.960862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2850.967778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2850.976604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2850.987340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2850.996068] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2851.002235] 8021q: adding VLAN 0 to HW filter on device team0 [ 2851.012426] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2851.020070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2851.029025] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2851.037039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2851.044518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2851.052783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2851.060589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2851.068244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2851.075916] bridge0: port 1(bridge_slave_0) entered blocking state [ 2851.082270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2851.089439] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2851.102671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2851.109987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2851.118054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2851.126227] bridge0: port 2(bridge_slave_1) entered blocking state [ 2851.132587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2851.141411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2851.149423] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2851.159446] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2851.167145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2851.175289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2851.185028] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2851.197213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2851.204108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2851.211928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2851.219245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2851.230916] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2851.237967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2851.245555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2851.254909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2851.262414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2851.269998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2851.284664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2851.292198] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2851.298206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2851.306469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2851.315147] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2851.327521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2851.335333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2851.343262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2851.350784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2851.361504] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2851.374890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2851.382970] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2851.390483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2851.397890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2851.407671] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2851.414264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2851.433567] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2851.444725] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2851.530563] device bridge_slave_1 left promiscuous mode [ 2851.536021] bridge0: port 2(bridge_slave_1) entered disabled state [ 2851.582251] device bridge_slave_0 left promiscuous mode [ 2851.587769] bridge0: port 1(bridge_slave_0) entered disabled state [ 2851.631222] device bridge_slave_1 left promiscuous mode [ 2851.636743] bridge0: port 2(bridge_slave_1) entered disabled state [ 2851.680835] device bridge_slave_0 left promiscuous mode [ 2851.686376] bridge0: port 1(bridge_slave_0) entered disabled state [ 2851.812658] device hsr_slave_1 left promiscuous mode [ 2851.853876] device hsr_slave_0 left promiscuous mode [ 2851.894495] team0 (unregistering): Port device team_slave_1 removed [ 2851.904829] team0 (unregistering): Port device team_slave_0 removed [ 2851.915695] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2851.964847] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2852.035306] bond0 (unregistering): Released all slaves [ 2852.122473] device hsr_slave_1 left promiscuous mode [ 2852.164374] device hsr_slave_0 left promiscuous mode [ 2852.204564] team0 (unregistering): Port device team_slave_1 removed [ 2852.214454] team0 (unregistering): Port device team_slave_0 removed [ 2852.225061] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2852.275463] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2852.338379] bond0 (unregistering): Released all slaves 04:07:54 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:54 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = dup2(r0, 0xffffffffffffffff) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) clock_gettime(0x0, &(0x7f00000005c0)) openat$cgroup_ro(r2, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 04:07:54 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf8038") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:54 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0xf7) [ 2852.413065] bridge0: port 2(bridge_slave_1) entered disabled state [ 2852.419596] bridge0: port 1(bridge_slave_0) entered disabled state [ 2852.480912] bridge0: port 2(bridge_slave_1) entered disabled state [ 2852.487615] bridge0: port 1(bridge_slave_0) entered disabled state [ 2852.529566] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2852.556847] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:07:55 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf8038") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:55 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:55 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:55 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0xf7) 04:07:55 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:55 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = dup2(r0, 0xffffffffffffffff) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) clock_gettime(0x0, &(0x7f00000005c0)) openat$cgroup_ro(r2, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) [ 2852.787388] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended 04:07:55 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2852.830703] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:07:55 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf8038") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:07:55 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:55 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0xf7) 04:07:55 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:55 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:07:55 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) 04:07:55 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2853.141767] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended 04:07:55 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2853.208290] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:07:55 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) 04:07:55 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = dup2(r0, 0xffffffffffffffff) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) clock_gettime(0x0, &(0x7f00000005c0)) openat$cgroup_ro(r2, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) 04:07:55 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2855.891336] IPVS: ftp: loaded support on port[0] = 21 [ 2856.751049] chnl_net:caif_netlink_parms(): no params data found [ 2856.792276] bridge0: port 1(bridge_slave_0) entered blocking state [ 2856.798702] bridge0: port 1(bridge_slave_0) entered disabled state [ 2856.807651] device bridge_slave_0 entered promiscuous mode [ 2856.814261] bridge0: port 2(bridge_slave_1) entered blocking state [ 2856.820722] bridge0: port 2(bridge_slave_1) entered disabled state [ 2856.827520] device bridge_slave_1 entered promiscuous mode [ 2856.847599] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2856.856431] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2856.874588] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2856.881988] team0: Port device team_slave_0 added [ 2856.887261] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2856.894373] team0: Port device team_slave_1 added [ 2856.899482] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2856.906755] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2856.963454] device hsr_slave_0 entered promiscuous mode [ 2857.000471] device hsr_slave_1 entered promiscuous mode [ 2857.040660] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2857.049058] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2857.061326] bridge0: port 2(bridge_slave_1) entered blocking state [ 2857.067679] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2857.074310] bridge0: port 1(bridge_slave_0) entered blocking state [ 2857.080659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2857.109437] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2857.116303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2857.126399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2857.135339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2857.142425] bridge0: port 1(bridge_slave_0) entered disabled state [ 2857.148973] bridge0: port 2(bridge_slave_1) entered disabled state [ 2857.157712] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2857.164495] 8021q: adding VLAN 0 to HW filter on device team0 [ 2857.175845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2857.183452] bridge0: port 1(bridge_slave_0) entered blocking state [ 2857.189778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2857.209355] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2857.219312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2857.230651] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2857.237383] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2857.245283] bridge0: port 2(bridge_slave_1) entered blocking state [ 2857.251709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2857.258927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2857.266527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2857.274161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2857.281718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2857.289378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2857.296154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2857.309578] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2857.320845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2857.450349] device bridge_slave_1 left promiscuous mode [ 2857.455813] bridge0: port 2(bridge_slave_1) entered disabled state [ 2857.500870] device bridge_slave_0 left promiscuous mode [ 2857.506351] bridge0: port 1(bridge_slave_0) entered disabled state [ 2857.582285] device hsr_slave_1 left promiscuous mode [ 2857.634676] device hsr_slave_0 left promiscuous mode [ 2857.674206] team0 (unregistering): Port device team_slave_1 removed [ 2857.684005] team0 (unregistering): Port device team_slave_0 removed [ 2857.693948] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2857.735050] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2857.793636] bond0 (unregistering): Released all slaves 04:08:00 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:08:00 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:08:00 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0xf7) [ 2857.843866] bridge0: port 2(bridge_slave_1) entered disabled state [ 2857.850502] bridge0: port 1(bridge_slave_0) entered disabled state 04:08:00 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:08:00 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 4: socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) syz_emit_ethernet(0x11, &(0x7f0000000080)={@local, @empty, [], {@x25={0x4305}}}, 0x0) [ 2858.002253] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2858.023083] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 04:08:00 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0x0, 0x13012, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {0x0}], 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0xf7) 04:08:00 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) 04:08:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) 04:08:00 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:00 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) [ 2858.374085] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2858.397926] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2860.321063] IPVS: ftp: loaded support on port[0] = 21 [ 2861.372643] chnl_net:caif_netlink_parms(): no params data found [ 2861.412897] bridge0: port 1(bridge_slave_0) entered blocking state [ 2861.419365] bridge0: port 1(bridge_slave_0) entered disabled state [ 2861.429605] device bridge_slave_0 entered promiscuous mode [ 2861.436576] bridge0: port 2(bridge_slave_1) entered blocking state [ 2861.446320] bridge0: port 2(bridge_slave_1) entered disabled state [ 2861.453475] device bridge_slave_1 entered promiscuous mode [ 2861.474269] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2861.486516] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2861.507067] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2861.514794] team0: Port device team_slave_0 added [ 2861.520128] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2861.527134] team0: Port device team_slave_1 added [ 2861.532540] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2861.539663] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2861.592107] device hsr_slave_0 entered promiscuous mode [ 2861.630398] device hsr_slave_1 entered promiscuous mode [ 2861.680555] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2861.687399] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2861.702755] bridge0: port 2(bridge_slave_1) entered blocking state [ 2861.709090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2861.715794] bridge0: port 1(bridge_slave_0) entered blocking state [ 2861.722146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2861.748246] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2861.754803] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2861.763327] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2861.775319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2861.782474] bridge0: port 1(bridge_slave_0) entered disabled state [ 2861.789008] bridge0: port 2(bridge_slave_1) entered disabled state [ 2861.797866] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2861.804599] 8021q: adding VLAN 0 to HW filter on device team0 [ 2861.814236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2861.822216] bridge0: port 1(bridge_slave_0) entered blocking state [ 2861.828539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2861.848914] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2861.858784] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2861.869108] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2861.880132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2861.887705] bridge0: port 2(bridge_slave_1) entered blocking state [ 2861.894168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2861.902038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2861.909564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2861.917104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2861.924792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2861.937330] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2861.945389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2861.952125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2861.962290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2862.360365] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2862.528462] bridge0: port 2(bridge_slave_1) entered disabled state [ 2862.536341] bridge0: port 1(bridge_slave_0) entered disabled state 04:08:05 executing program 3: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:05 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:05 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000540)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000480)='\x11\xabt\xecY]\x13\x00O\xb7\x00\x9cUKP\xd1?r\xd8Y\x97\xe9!\"\xf7W\xde\xe4\xe8\xd5\xd3\xad\xceIs\x8e,\x03\br\xc0\x96s\xfam\x91g\xd7\\m|NN\x16\xf3o\xf5\t\xa9\x1a\xf1\x85\x83\v;M\x0f\xa5\xc9\xf0\x85\xac\x99\x87\xe8\xd2\xdd\x1b\xb4P\xf3T}[\x01\xef6#\xbb\xccH\xebO7\x13\xe4\xac\xce{.\x94\xd5\xc4\x11\xfe\xa5\xd0\x87?\xdc\x88\x99:<\xfe!\xaa\x85Y\x88\b-\x19\x04\xcc\xc5\xf0\x8er\xe7\x1a\x15\xc8\x9fL3\x18%\xe6\xf8\x06b@;\xf93\x1e\xba\xbb_JF\xaeZ\xb1H\xc9\x02ta\xa6\x91B\xa6\xea1g\xf1K\xa7A\x19\xc9\x04!B\x85\x87}4b\x7f\x93\xa3^\xbf1', 0xbb, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="600001000000", @ANYRES16=0x0, @ANYBLOB="00000000000000000000040000004c0004000c00070008000200000000003c0007000800010000000000080004000000000008000200000000000800030000000000080002000000000008000200000000000800020000000000"], 0x60}}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00020000000000000067681bfd070000000100000000fb6c7a2ce29a"}, 0x305) 04:08:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xa) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000140)={0x980913}) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000000)=""/31, 0x1f}, {&(0x7f00000000c0)=""/66, 0x42}, {0x0}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {0x0}], 0x7, 0x0) socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f00000009c0)=[@text64={0x40, &(0x7f0000000940)="660f64ebc7442400fb000000c7442402a8ce0000ff2c24400f12494d66ba410066b8070066ef0f08b805000000b9030000000f01d966baf80cb80220fb83ef66bafc0c66b8000166ef430f300f01c9c74424004d000000c744240200380000ff1c24"}], 0x1f8, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 04:08:05 executing program 2: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000140)="a5ebe3eabddf5095dfb4529d0ff3e26825f70fe474a9df2ad2a2910771a55374e46d9c838cb20575dfa7f2cb01f4a1822e3d7e5c094e7e96b1ed4188984c192a65f33e1fe62d607b706721ad6a271ce5af7d732bc8abe32f863c97c7cdee35c08f927f8756bfab46810000d94953d46d643b699c0a3fbf803839ddb338") syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaae04, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x1, 0x0) [ 2862.870867] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended [ 2862.889052] EXT4-fs (loop2): Number of reserved GDT blocks insanely large: 58652 [ 2863.220505] device bridge_slave_1 left promiscuous mode [ 2863.230248] bridge0: port 2(bridge_slave_1) entered disabled state [ 2863.284319] device bridge_slave_0 left promiscuous mode [ 2863.289859] bridge0: port 1(bridge_slave_0) entered disabled state [ 2863.364219] device bridge_slave_1 left promiscuous mode [ 2863.379883] bridge0: port 2(bridge_slave_1) entered disabled state [ 2863.412090] device bridge_slave_0 left promiscuous mode [ 2863.417580] bridge0: port 1(bridge_slave_0) entered disabled state [ 2863.492523] device bridge_slave_1 left promiscuous mode [ 2863.503432] bridge0: port 2(bridge_slave_1) entered disabled state [ 2863.571546] device bridge_slave_0 left promiscuous mode [ 2863.577039] bridge0: port 1(bridge_slave_0) entered disabled state [ 2863.692448] device hsr_slave_1 left promiscuous mode [ 2863.733830] device hsr_slave_0 left promiscuous mode [ 2863.774126] team0 (unregistering): Port device team_slave_1 removed [ 2863.783638] team0 (unregistering): Port device team_slave_0 removed [ 2863.793695] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2863.835338] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2863.902486] bond0 (unregistering): Released all slaves [ 2864.011820] device hsr_slave_1 left promiscuous mode [ 2864.085102] device hsr_slave_0 left promiscuous mode [ 2864.123982] team0 (unregistering): Port device team_slave_1 removed [ 2864.133440] team0 (unregistering): Port device team_slave_0 removed [ 2864.144150] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2864.204504] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2864.271575] bond0 (unregistering): Released all slaves [ 2864.351583] device hsr_slave_1 left promiscuous mode [ 2864.382490] device hsr_slave_0 left promiscuous mode [ 2864.434157] team0 (unregistering): Port device team_slave_1 removed [ 2864.443486] team0 (unregistering): Port device team_slave_0 removed [ 2864.453398] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2864.523320] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2864.612125] bond0 (unregistering): Released all slaves [ 2867.770852] IPVS: ftp: loaded support on port[0] = 21 [ 2868.617577] chnl_net:caif_netlink_parms(): no params data found [ 2868.625404] IPVS: ftp: loaded support on port[0] = 21 [ 2868.659124] bridge0: port 1(bridge_slave_0) entered blocking state [ 2868.666740] bridge0: port 1(bridge_slave_0) entered disabled state [ 2868.674115] device bridge_slave_0 entered promiscuous mode [ 2868.680941] bridge0: port 2(bridge_slave_1) entered blocking state [ 2868.687476] bridge0: port 2(bridge_slave_1) entered disabled state [ 2868.694490] device bridge_slave_1 entered promiscuous mode [ 2868.724501] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2868.733906] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2868.757283] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2868.764504] team0: Port device team_slave_0 added [ 2868.774230] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2868.781285] team0: Port device team_slave_1 added [ 2868.786555] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2868.796175] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2868.873234] device hsr_slave_0 entered promiscuous mode [ 2868.910412] device hsr_slave_1 entered promiscuous mode [ 2868.952703] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2868.962693] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2869.008294] chnl_net:caif_netlink_parms(): no params data found [ 2869.026200] bridge0: port 2(bridge_slave_1) entered blocking state [ 2869.032581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2869.039183] bridge0: port 1(bridge_slave_0) entered blocking state [ 2869.045552] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2869.072967] bridge0: port 1(bridge_slave_0) entered blocking state [ 2869.079342] bridge0: port 1(bridge_slave_0) entered disabled state [ 2869.086746] device bridge_slave_0 entered promiscuous mode [ 2869.093919] bridge0: port 2(bridge_slave_1) entered blocking state [ 2869.100315] bridge0: port 2(bridge_slave_1) entered disabled state [ 2869.107187] device bridge_slave_1 entered promiscuous mode [ 2869.126580] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2869.135419] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2869.153719] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2869.161224] team0: Port device team_slave_0 added [ 2869.166712] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2869.173815] team0: Port device team_slave_1 added [ 2869.179153] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2869.186966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2869.254259] device hsr_slave_0 entered promiscuous mode [ 2869.310438] device hsr_slave_1 entered promiscuous mode [ 2869.360683] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2869.367581] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2869.384117] bridge0: port 2(bridge_slave_1) entered blocking state [ 2869.390485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2869.397051] bridge0: port 1(bridge_slave_0) entered blocking state [ 2869.403507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2869.425728] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2869.431943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2869.441070] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2869.453163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2869.460336] bridge0: port 1(bridge_slave_0) entered disabled state [ 2869.466887] bridge0: port 2(bridge_slave_1) entered disabled state [ 2869.474490] bridge0: port 1(bridge_slave_0) entered disabled state [ 2869.481327] bridge0: port 2(bridge_slave_1) entered disabled state [ 2869.490223] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2869.496292] 8021q: adding VLAN 0 to HW filter on device team0 [ 2869.505905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2869.513490] bridge0: port 1(bridge_slave_0) entered blocking state [ 2869.519805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2869.534489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2869.542098] bridge0: port 2(bridge_slave_1) entered blocking state [ 2869.548410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2869.561159] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2869.574820] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2869.584946] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2869.595368] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2869.604073] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2869.611731] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2869.618622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2869.626765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2869.634547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2869.642846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2869.652038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2869.662989] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2869.673455] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2869.682137] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2869.688690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2869.696395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2869.706146] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2869.712383] 8021q: adding VLAN 0 to HW filter on device team0 [ 2869.719982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2869.732843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2869.739848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2869.752904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2869.760681] bridge0: port 1(bridge_slave_0) entered blocking state [ 2869.767002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2869.778285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2869.786216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2869.794999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2869.803193] bridge0: port 2(bridge_slave_1) entered blocking state [ 2869.809561] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2869.818298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2869.825383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2869.834821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2869.841813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2869.852165] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2869.859011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2869.867275] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2869.875569] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2869.905507] bridge0: port 2(bridge_slave_1) entered disabled state [ 2869.912144] bridge0: port 1(bridge_slave_0) entered disabled state [ 2869.956649] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2869.967981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2869.977342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2869.987722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2869.995590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2870.002991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2870.012965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2870.020545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2870.027939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2870.036233] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2870.043182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2870.054334] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2870.068385] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2870.740382] device bridge_slave_1 left promiscuous mode [ 2870.745864] bridge0: port 2(bridge_slave_1) entered disabled state [ 2870.800633] device bridge_slave_0 left promiscuous mode [ 2870.806109] bridge0: port 1(bridge_slave_0) entered disabled state [ 2870.901504] device hsr_slave_1 left promiscuous mode [ 2870.942692] device hsr_slave_0 left promiscuous mode [ 2870.983683] team0 (unregistering): Port device team_slave_1 removed [ 2870.994966] team0 (unregistering): Port device team_slave_0 removed [ 2871.004214] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2871.074377] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2871.152228] bond0 (unregistering): Released all slaves [ 2871.204355] bridge0: port 2(bridge_slave_1) entered disabled state [ 2871.210879] bridge0: port 1(bridge_slave_0) entered disabled state [ 2873.310455] device bridge_slave_1 left promiscuous mode [ 2873.315993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2873.370885] device bridge_slave_0 left promiscuous mode [ 2873.376348] bridge0: port 1(bridge_slave_0) entered disabled state [ 2873.461732] device hsr_slave_1 left promiscuous mode [ 2873.502582] device hsr_slave_0 left promiscuous mode [ 2873.542690] team0 (unregistering): Port device team_slave_1 removed [ 2873.552321] team0 (unregistering): Port device team_slave_0 removed [ 2873.561582] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2873.603227] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2873.690426] bond0 (unregistering): Released all slaves [ 3008.470326] INFO: task syz-executor.4:15749 blocked for more than 140 seconds. [ 3008.477737] Not tainted 4.14.150 #0 [ 3008.481924] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3008.489881] syz-executor.4 D28528 15749 15422 0x00000004 [ 3008.495604] Call Trace: [ 3008.498233] __schedule+0x7b8/0x1cd0 [ 3008.502002] ? pci_mmcfg_check_reserved+0x150/0x150 [ 3008.507012] schedule+0x92/0x1c0 [ 3008.510401] schedule_timeout+0x93b/0xe10 [ 3008.514535] ? wait_for_completion+0x274/0x420 [ 3008.519103] ? find_held_lock+0x35/0x130 [ 3008.523237] ? usleep_range+0x130/0x130 [ 3008.527205] ? wait_for_completion+0x274/0x420 [ 3008.531821] ? _raw_spin_unlock_irq+0x28/0x90 [ 3008.536305] ? trace_hardirqs_on_caller+0x400/0x590 [ 3008.541363] wait_for_completion+0x27c/0x420 [ 3008.545760] ? try_to_wake_up+0xa8/0xf90 [ 3008.549798] ? wait_for_completion_interruptible+0x490/0x490 [ 3008.555619] ? wake_up_q+0xf0/0xf0 [ 3008.559154] kthread_stop+0xda/0x650 [ 3008.562940] vivid_stop_generating_vid_cap+0x1b9/0x664 [ 3008.568213] vid_cap_stop_streaming+0x7c/0xd0 [ 3008.572735] ? vid_cap_buf_queue+0x230/0x230 [ 3008.577169] __vb2_queue_cancel+0xa3/0x890 [ 3008.581433] ? lock_downgrade+0x740/0x740 [ 3008.585602] vb2_core_streamoff+0x52/0x110 [ 3008.589813] __vb2_cleanup_fileio+0x78/0x150 [ 3008.594301] vb2_core_queue_release+0x1d/0x80 [ 3008.598843] _vb2_fop_release+0x1cf/0x2a0 [ 3008.603034] vb2_fop_release+0x75/0xc0 [ 3008.606920] vivid_fop_release+0x180/0x3f0 [ 3008.611194] ? vivid_remove+0x3d0/0x3d0 [ 3008.615214] ? dev_debug_store+0xe0/0xe0 [ 3008.619256] v4l2_release+0xf9/0x190 [ 3008.623004] __fput+0x275/0x7a0 [ 3008.626281] ____fput+0x16/0x20 [ 3008.629542] task_work_run+0x114/0x190 [ 3008.633460] exit_to_usermode_loop+0x1da/0x220 [ 3008.638033] do_syscall_64+0x4bc/0x640 [ 3008.641958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3008.646807] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 3008.652020] RIP: 0033:0x413ad1 [ 3008.655196] RSP: 002b:00007fff4e48feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 3008.662945] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000413ad1 [ 3008.670253] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 3008.678467] RBP: 0000000000000001 R08: 000000006e783fbb R09: 000000006e783fbf [ 3008.685772] R10: 00007fff4e48ff90 R11: 0000000000000293 R12: 000000000075bf20 [ 3008.693066] R13: 00000000002b9d52 R14: 0000000000764ab0 R15: 000000000075bf2c [ 3008.700403] [ 3008.700403] Showing all locks held in the system: [ 3008.706719] 1 lock held by khungtaskd/1002: [ 3008.711240] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 3008.720340] 1 lock held by rsyslogd/6665: [ 3008.724471] #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0xab/0xd0 [ 3008.732758] 2 locks held by getty/6788: [ 3008.736719] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 3008.745419] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 3008.755599] 2 locks held by getty/6789: [ 3008.759554] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 3008.768265] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 3008.777603] 2 locks held by getty/6790: [ 3008.781598] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 3008.790354] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 3008.799640] 2 locks held by getty/6791: [ 3008.803638] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 3008.812342] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 3008.821679] 2 locks held by getty/6792: [ 3008.825640] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 3008.834345] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 3008.843651] 2 locks held by getty/6793: [ 3008.847606] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 3008.856305] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 3008.865632] 2 locks held by getty/6794: [ 3008.869584] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 3008.878285] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 3008.887613] [ 3008.889237] ============================================= [ 3008.889237] [ 3008.896361] NMI backtrace for cpu 1 [ 3008.899984] CPU: 1 PID: 1002 Comm: khungtaskd Not tainted 4.14.150 #0 [ 3008.906545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3008.915877] Call Trace: [ 3008.918458] dump_stack+0x138/0x197 [ 3008.922082] nmi_cpu_backtrace.cold+0x57/0x94 [ 3008.926556] ? irq_force_complete_move.cold+0x7d/0x7d [ 3008.931726] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 3008.936984] arch_trigger_cpumask_backtrace+0x14/0x20 [ 3008.942169] watchdog+0x5e7/0xb90 [ 3008.945606] kthread+0x319/0x430 [ 3008.948954] ? hungtask_pm_notify+0x50/0x50 [ 3008.953315] ? kthread_create_on_node+0xd0/0xd0 [ 3008.957969] ret_from_fork+0x24/0x30 [ 3008.961770] Sending NMI from CPU 1 to CPUs 0: [ 3008.966310] NMI backtrace for cpu 0 skipped: idling at pc 0xffffffff861c3a9e [ 3008.967266] Kernel panic - not syncing: hung_task: blocked tasks [ 3008.979635] CPU: 1 PID: 1002 Comm: khungtaskd Not tainted 4.14.150 #0 [ 3008.986226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3008.995558] Call Trace: [ 3008.998136] dump_stack+0x138/0x197 [ 3009.001739] panic+0x1f9/0x42d [ 3009.004916] ? add_taint.cold+0x16/0x16 [ 3009.008869] ? irq_force_complete_move.cold+0x7d/0x7d [ 3009.014038] watchdog+0x5f8/0xb90 [ 3009.017475] kthread+0x319/0x430 [ 3009.020819] ? hungtask_pm_notify+0x50/0x50 [ 3009.025112] ? kthread_create_on_node+0xd0/0xd0 [ 3009.029760] ret_from_fork+0x24/0x30 [ 3009.034785] Kernel Offset: disabled [ 3009.038410] Rebooting in 86400 seconds..