[ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Warning: Permanently added '10.128.1.49' (ECDSA) to the list of known hosts. 2021/11/08 11:56:51 fuzzer started 2021/11/08 11:56:52 dialing manager at 10.128.0.169:45487 [ 172.959611][ T6322] cgroup: Unknown subsys name 'net' 2021/11/08 11:56:53 syscalls: 3594 2021/11/08 11:56:53 code coverage: enabled 2021/11/08 11:56:53 comparison tracing: enabled 2021/11/08 11:56:53 extra coverage: enabled 2021/11/08 11:56:53 setuid sandbox: enabled 2021/11/08 11:56:53 namespace sandbox: enabled 2021/11/08 11:56:53 Android sandbox: /sys/fs/selinux/policy does not exist 2021/11/08 11:56:53 fault injection: enabled 2021/11/08 11:56:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/11/08 11:56:53 net packet injection: enabled 2021/11/08 11:56:53 net device setup: enabled 2021/11/08 11:56:53 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/11/08 11:56:53 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 172.995006][ T6322] cgroup: Unknown subsys name 'rlimit' 2021/11/08 11:56:53 USB emulation: enabled 2021/11/08 11:56:53 hci packet injection: enabled 2021/11/08 11:56:53 wifi device emulation: enabled 2021/11/08 11:56:53 802.15.4 emulation: enabled 2021/11/08 11:56:53 fetching corpus: 0, signal 0/2000 (executing program) 2021/11/08 11:56:53 fetching corpus: 50, signal 17313/20739 (executing program) 2021/11/08 11:56:54 fetching corpus: 100, signal 31192/35649 (executing program) 2021/11/08 11:56:54 fetching corpus: 149, signal 38337/43775 (executing program) 2021/11/08 11:56:54 fetching corpus: 198, signal 45066/51350 (executing program) 2021/11/08 11:56:54 fetching corpus: 248, signal 48955/56104 (executing program) 2021/11/08 11:56:54 fetching corpus: 298, signal 53371/61230 (executing program) 2021/11/08 11:56:54 fetching corpus: 348, signal 56423/64980 (executing program) 2021/11/08 11:56:54 fetching corpus: 398, signal 59240/68461 (executing program) 2021/11/08 11:56:54 fetching corpus: 448, signal 61201/71131 (executing program) 2021/11/08 11:56:54 fetching corpus: 498, signal 64679/74986 (executing program) 2021/11/08 11:56:54 fetching corpus: 548, signal 67450/78169 (executing program) 2021/11/08 11:56:54 fetching corpus: 598, signal 72677/83118 (executing program) 2021/11/08 11:56:54 fetching corpus: 648, signal 74239/85170 (executing program) 2021/11/08 11:56:55 fetching corpus: 698, signal 77041/87976 (executing program) 2021/11/08 11:56:55 fetching corpus: 746, signal 78886/90065 (executing program) 2021/11/08 11:56:55 fetching corpus: 796, signal 82176/93129 (executing program) 2021/11/08 11:56:55 fetching corpus: 845, signal 84637/95551 (executing program) 2021/11/08 11:56:55 fetching corpus: 895, signal 87023/97814 (executing program) 2021/11/08 11:56:55 fetching corpus: 945, signal 88708/99509 (executing program) 2021/11/08 11:56:55 fetching corpus: 995, signal 90777/101432 (executing program) 2021/11/08 11:56:55 fetching corpus: 1045, signal 93124/103441 (executing program) 2021/11/08 11:56:55 fetching corpus: 1095, signal 94295/104609 (executing program) 2021/11/08 11:56:55 fetching corpus: 1145, signal 96118/106151 (executing program) 2021/11/08 11:56:55 fetching corpus: 1195, signal 99739/108737 (executing program) 2021/11/08 11:56:55 fetching corpus: 1245, signal 101470/110080 (executing program) 2021/11/08 11:56:55 fetching corpus: 1295, signal 102575/111031 (executing program) 2021/11/08 11:56:56 fetching corpus: 1345, signal 103401/111790 (executing program) 2021/11/08 11:56:56 fetching corpus: 1394, signal 105800/113283 (executing program) 2021/11/08 11:56:56 fetching corpus: 1444, signal 108148/114747 (executing program) 2021/11/08 11:56:56 fetching corpus: 1494, signal 109944/115831 (executing program) 2021/11/08 11:56:56 fetching corpus: 1544, signal 110896/116463 (executing program) 2021/11/08 11:56:56 fetching corpus: 1594, signal 112176/117229 (executing program) 2021/11/08 11:56:56 fetching corpus: 1644, signal 113503/117955 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/118580 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/118697 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/118805 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/118910 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119015 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119125 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119231 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119332 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119418 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119523 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119642 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119757 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119882 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/119999 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/120120 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/120228 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/120350 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/120463 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/120581 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/120682 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/120787 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/120913 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/121011 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/121142 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/121287 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/121395 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/121414 (executing program) 2021/11/08 11:56:56 fetching corpus: 1685, signal 114744/121414 (executing program) 2021/11/08 11:56:58 starting 6 fuzzer processes 11:57:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c000000020601020000000000000000000000000500040000000000050005000200000005000100070080000d000300686173683a6e6574000000001400078008000840000000700800064000000000090002"], 0x5c}}, 0x0) [ 187.577992][ T6333] chnl_net:caif_netlink_parms(): no params data found [ 187.965956][ T6333] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.974427][ T6333] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.984153][ T6333] device bridge_slave_0 entered promiscuous mode [ 188.008077][ T6333] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.015592][ T6333] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.025453][ T6333] device bridge_slave_1 entered promiscuous mode [ 188.106032][ T6333] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.127380][ T6333] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.209216][ T6333] team0: Port device team_slave_0 added [ 188.233413][ T6333] team0: Port device team_slave_1 added [ 188.306067][ T6333] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 188.313466][ T6333] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.339731][ T6333] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 188.366668][ T6333] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 188.373846][ T6333] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.400136][ T6333] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 188.501019][ T6333] device hsr_slave_0 entered promiscuous mode [ 188.511651][ T6333] device hsr_slave_1 entered promiscuous mode [ 188.824132][ T7] Bluetooth: hci0: command 0x0409 tx timeout [ 188.921618][ T6333] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 188.974186][ T6333] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 189.009009][ T6333] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 189.037377][ T6333] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 189.336763][ T6333] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.373848][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.383916][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.407386][ T6333] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.433683][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.443970][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.454117][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.461465][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.512916][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.522979][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.533432][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.543272][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.550644][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.559909][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.571487][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.593708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.604648][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.620106][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.646144][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.657042][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.696902][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.707002][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.717307][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.727383][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.749857][ T6333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.822990][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.830841][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.870641][ T6333] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.943775][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 189.954152][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.019654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 190.029738][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.055898][ T6333] device veth0_vlan entered promiscuous mode [ 190.065460][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.075040][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.115274][ T6333] device veth1_vlan entered promiscuous mode [ 190.201297][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 190.211395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 190.221463][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 190.232140][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 190.256783][ T6333] device veth0_macvtap entered promiscuous mode [ 190.280134][ T6333] device veth1_macvtap entered promiscuous mode [ 190.351040][ T6333] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 190.359759][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 190.369821][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 190.379822][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 190.390446][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 190.417569][ T6333] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 190.426294][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 190.437426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.461783][ T6333] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.462193][ T6333] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.462365][ T6333] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.489071][ T6333] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.905446][ T7] Bluetooth: hci0: command 0x041b tx timeout [ 191.202771][ T152] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 191.210825][ T152] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 191.219313][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 191.377277][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 191.385628][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 191.397319][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:57:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c000000020601020000000000000000000000000500040000000000050005000200000005000100070080000d000300686173683a6e6574000000001400078008000840000000700800064000000000090002"], 0x5c}}, 0x0) 11:57:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c000000020601020000000000000000000000000500040000000000050005000200000005000100070080000d000300686173683a6e6574000000001400078008000840000000700800064000000000090002"], 0x5c}}, 0x0) 11:57:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c000000020601020000000000000000000000000500040000000000050005000200000005000100070080000d000300686173683a6e6574000000001400078008000840000000700800064000000000090002"], 0x5c}}, 0x0) 11:57:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) 11:57:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) 11:57:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) [ 192.982749][ T7] Bluetooth: hci0: command 0x040f tx timeout 11:57:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) 11:57:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) 11:57:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) 11:57:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) 11:57:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) 11:57:15 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) 11:57:15 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x27) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x271) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) dup2(r1, r2) 11:57:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) [ 195.062222][ T7] Bluetooth: hci0: command 0x0419 tx timeout 11:57:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x8) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)='\t', 0x1, 0x20042041, 0x0, 0x0) close(r0) 11:57:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) 11:57:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x400000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xff}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 11:57:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) 11:57:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) 11:57:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) 11:57:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) 11:57:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) [ 202.433419][ T6797] chnl_net:caif_netlink_parms(): no params data found 11:57:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) [ 202.794644][ T6797] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.803366][ T6797] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.818224][ T6797] device bridge_slave_0 entered promiscuous mode [ 202.854339][ T6797] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.861751][ T6797] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.872790][ T6797] device bridge_slave_1 entered promiscuous mode [ 203.037132][ T6797] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.086157][ T6797] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.259649][ T6797] team0: Port device team_slave_0 added [ 203.299689][ T6797] team0: Port device team_slave_1 added [ 203.440613][ T6797] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 203.447942][ T6797] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.474362][ T6797] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 11:57:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) [ 203.497010][ T6797] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 203.504695][ T6797] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.531065][ T6797] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 203.554471][ T30] Bluetooth: hci1: command 0x0409 tx timeout [ 203.644872][ T6797] device hsr_slave_0 entered promiscuous mode [ 203.684647][ T6797] device hsr_slave_1 entered promiscuous mode [ 203.705123][ T6797] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 203.713577][ T6797] Cannot create hsr debugfs directory 11:57:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) [ 204.486171][ T6797] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 204.529413][ T6797] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 204.578671][ T6797] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 204.624450][ T6797] netdevsim netdevsim1 netdevsim3: renamed from eth3 11:57:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x66, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000100)=""/75) ioctl$EVIOCGPROP(r0, 0x80404509, 0x0) [ 205.140098][ T6797] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.209759][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.219915][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.255798][ T6797] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.337149][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.347666][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.357871][ T1465] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.365327][ T1465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.474959][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.484777][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.495187][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.504943][ T1465] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.512385][ T1465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.521650][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.672765][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.684457][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.695483][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.706412][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 11:57:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x20}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) pipe(&(0x7f0000000040)) [ 205.717328][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.728310][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.738383][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.768046][ T1465] Bluetooth: hci1: command 0x041b tx timeout [ 205.777573][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.788127][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.798398][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.814391][ T6797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.962306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.970241][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 206.062469][ T6797] 8021q: adding VLAN 0 to HW filter on device batadv0 11:57:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x20}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) pipe(&(0x7f0000000040)) [ 206.217157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.227735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.307767][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.318668][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.347852][ T6797] device veth0_vlan entered promiscuous mode [ 206.358876][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.368901][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.411369][ T6797] device veth1_vlan entered promiscuous mode [ 206.526399][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.536900][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.580411][ T6797] device veth0_macvtap entered promiscuous mode [ 206.628164][ T6797] device veth1_macvtap entered promiscuous mode [ 206.700960][ T6797] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.712112][ T6797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.726268][ T6797] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.736095][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 206.746453][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.756514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.767003][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.800813][ T6797] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.811549][ T6797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.825472][ T6797] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.836032][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.847225][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.940533][ T6797] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.950183][ T6797] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.959333][ T6797] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.968363][ T6797] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 207.783254][ T1465] Bluetooth: hci1: command 0x040f tx timeout [ 207.791527][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 207.798228][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 [ 207.815594][ T152] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 207.824288][ T152] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 207.834540][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 208.003634][ T152] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 208.011582][ T152] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 208.023493][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:57:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x400000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xff}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 11:57:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x20}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) pipe(&(0x7f0000000040)) 11:57:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x20}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) pipe(&(0x7f0000000040)) 11:57:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x400000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xff}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 11:57:29 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x20}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) pipe(&(0x7f0000000040)) 11:57:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x400000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xff}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 11:57:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x20}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) pipe(&(0x7f0000000040)) 11:57:30 executing program 1: r0 = syz_usb_connect(0x2, 0x2d, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYBLOB="90a0eaab61eb1e0e0af41f4fa5845f589b9049871d60e7fc9e95942cb6dcc3e704b5c3b221974f03f00c7f7cfeb0b02ad8798170682c9ce7b200b9e9266a2224c37341d00afa06683d9f990cee6830ebfc37dc945863f377463cecefbb647fb619b53d752876505237159026de4bec96aa733e0a94c1ef9f244f2cfb7708d4631cd79947a975547bcc45ace37bd8b9ac51cfcc1e606654d72d9bf42031c50f23e2becd92606c4a128afc45ea7ce93217ace9e099a4fe54e54df70234ba5e1d03c2165c1bd8bc05574245447c45402358999d7a"], 0x0) r1 = syz_usb_connect$cdc_ncm(0x3, 0x7f, &(0x7f0000000ac0)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6d, 0x2, 0x1, 0xfb, 0xb0, 0xf2, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x7, 0x24, 0x6, 0x0, 0x1, "df47"}, {0x5, 0x24, 0x0, 0x1ff}, {0xd, 0x24, 0xf, 0x1, 0xd57, 0x7f, 0x9, 0x97}, {0x6, 0x24, 0x1a, 0xfff, 0xd}, [@dmm={0x7, 0x24, 0x14, 0x4, 0xff}, @country_functional={0x8, 0x24, 0x7, 0x0, 0x2, [0xfffb]}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x28, 0x5, 0x9}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x0, 0x7, 0x4, 0x6}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x5, 0x4, 0x9}}}}}}}]}}, &(0x7f0000001240)={0xa, &(0x7f0000000b40)={0xa, 0x6, 0x110, 0x8, 0x0, 0x94, 0x20, 0xff}, 0x198, &(0x7f0000000b80)={0x5, 0xf, 0x198, 0x6, [@generic={0x5f, 0x10, 0x3, "bc0ec0445cf12d2ea05522ad67a7f06f125244ecfcfaea16aa356d78e097a8198d816e4e994e764edc044304a0b04381bec522b79f95bdb817f10cd90010e6228d1c579b03c9efbd11af6aef3c31530849ab7f162440fc8404ee8804"}, @ss_container_id={0x14, 0x10, 0x4, 0x9, "4778b7dcfa4f36eccfcff3be6ed0f658"}, @generic={0xc0, 0x10, 0x9, "3228239ad3e46bf100f9886abc208f974566f5b8d9fe8395c313c979920a1cb8a83279e7b6a081ee02c79a7e87835d999922078990267b2dee8d77877f11df9d8da85d5fedb5b524ca62cc95027b30b506a9ab860518aae2e4669812035874f263ed24ab7ca38acf9d4a51a032e1ee255c75ac80e6f71a5d43beb74a4c1edfbb2f0f54b98267f9cdf9a320b27574574a692679ae28785e3adfda4c91c50a97c2b7b03393bb129592375b39671025d2d0a7d4edcbc61fe6d5f38765d1b4"}, @ssp_cap={0x24, 0x10, 0xa, 0x2, 0x6, 0x2, 0xff00, 0x9, [0xc0, 0x3f00, 0x8, 0xff3f00, 0xff0000, 0xfe80]}, @ssp_cap={0x18, 0x10, 0xa, 0x1a, 0x3, 0x4, 0xf00, 0x7ff, [0xf, 0x30, 0x1feffe9]}, @ssp_cap={0x24, 0x10, 0xa, 0x1f, 0x6, 0x1, 0xf011, 0x3, [0xc030, 0x0, 0xff000f, 0x3f30, 0xffc00f, 0xffc0c0]}]}, 0x9, [{0x4, &(0x7f0000000d40)=@lang_id={0x4, 0x3, 0x3c01}}, {0x4, &(0x7f0000000d80)=@lang_id={0x4}}, {0xb2, &(0x7f0000000dc0)=@string={0xb2, 0x3, "44b2c6bd92d83466f03154d9a9356791c5a8c50e66356bc4c00f477b246fcdc620b542549d794d134fa90b907880c65aed80bc664092afe771ef5baa4fd952335384a9d1579ab89f6f7599113b0a19d220bb4efdc1f2318a6411ef03c60fb38475e1526f1ec31ed22487b4e48d56ba0b583d25dfa7554746997bc789af5f8cfe8ce3c0c475a587d4678c395a55ef5fabb311be1f4019cabd61d08dfb6642a3008a8fc2de2f763cd05b16b93ddb618657"}}, {0x85, &(0x7f0000000e80)=@string={0x85, 0x3, "1220af53d5857d52922c28a61bdaf2eb9b6385cc2779c30d2b6c829c8e348f035d0836ba171d506665a47fa43260674455223834b648e4eaa4e546104bd4068ca071523e7c4a85ec74e24664336384c5ab1fa883e9c1ba57eeba8c0c986b49248ca52d0911e4c94d0180d0b83f56ed86c56f4a9f0da10d85bc3285765348fe67320b84"}}, {0xa9, &(0x7f0000000f40)=@string={0xa9, 0x3, "4b506d2edb4c83862667a26fd6c10fbb47a4bc5f22b1b474050963c8308d126a0c8c64a600f3e2136405d92aefc64c7e48436bccdf672187c59ae7470ce7a72978f4a079482fdb8a4bc197f10149e215c1fc7011a082438b083bfd5e91a5b757d174162fc1149fa1608e9f7c118e54036ba05f12fe2a810e7a95fc5f9ed7d55a7ecc7c0447421ef991bfcca7e9c676385ac6cc0d0420011cbd3f655ffb49c75886b659a7e8eae2"}}, {0x4, &(0x7f0000001000)=@lang_id={0x4, 0x3, 0x40e}}, {0xa0, &(0x7f0000001040)=@string={0xa0, 0x3, "3e89a963530e509d6f78df878db29a91e3235a2c6538392cad58344b7f197bf8f597c5f783b95beacf9ac6e50d894de2eb62aee6132d90e3f1b557fc19b8c6fc07aa196b022cda948e7f809fd10069df59ad003d5ea01c26372ec29395d9a03ad751cda9dc44eaeb991add10d00e1944e86f25df448da96bfa941c093748d19e520c6c0e5a187e29c6e8726bebbb4c0f63200f33049bd5d9e990529d5f27"}}, {0x4, &(0x7f0000001100)=@lang_id={0x4, 0x3, 0x300a}}, {0xfb, &(0x7f0000001140)=@string={0xfb, 0x3, "874dab98bb67f44ff5bb71d9dd43a7ab72f8a3e0c270a395d27dbed692d2ebf3b06c155564b7ef1641656d49452d4db9841382642b148924ba2927ea7341d859486f7276d6c55853b0cdc996a6a392a7f199559fb7b7316a6a66072bfb327e2622e7f5c211002114cd4b8893ca4a21f885311c63ef38f2b05be75bad7859e98083ddb19e1245a39f1171b8e21e1ce1b7f61489f339f5d07f79963eea7036c69e09d2a8627f5c45a1390a81af574f13c944c8658a75e6aff0a58207c9fe116e64b478488009bbe69e0ab4516e8863936e83dc9867bfc8a65081da6e04d133d7750b78e65638c8a256926359951f88c8c8d38a80f0a7edd185b7"}}]}) syz_usb_control_io(r1, &(0x7f0000001500)={0x18, &(0x7f00000012c0)={0x0, 0x4, 0xed, {0xed, 0x10, "3596d4dda109485c67e05f245372a770e6dfe7a770db000b0ded4ed54a96c560d13a98ab16e276b8949da723bcf5a887f50ee01495c66bbaabdc20b5026cea05b23534d8c95a92528837d2366af43210549ee2a1f0399651ac702bce612b7f05a88b89d1fb38b03cf92eb2603412f8cd970e5f4780965d0776e1bcb5f6f89e05543f372691694a54e9f9d812b1a43173d4a05d8240b240dce17af04e77676478a7ab3587209766a10583099ace4b9d5d8f00f4be8ba8cc55172406cad34bd2e740032bbfc798fff861fb01b17d6402380bca73332d3469e921b5a2b308ff68ee9c95b5248ccd07929f1d35"}}, &(0x7f00000013c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0xc0a}}, &(0x7f0000001400)={0x0, 0xf, 0x3e, {0x5, 0xf, 0x3e, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x7, "477f86f4c8aeb75dde880a063648f3e5"}, @ptm_cap={0x3}, @ssp_cap={0x18, 0x10, 0xa, 0x3f, 0x3, 0x7fff, 0x0, 0xff, [0xc030, 0x7e, 0xff0000]}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xa, 0x3, 0xfd}]}}, &(0x7f0000001480)={0x20, 0x29, 0xf, {0xf, 0x29, 0x3, 0x1, 0x1, 0x40, "8b6ae070", "79951790"}}, &(0x7f00000014c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0xa9, 0x18, 0x3f, 0xea, 0x3f, 0x9, 0x6}}}, &(0x7f0000001a00)={0x44, &(0x7f0000001540)={0x20, 0xe, 0xc3, "16b725baa7805f99ecab42a5499e0aa79fa1c2ef1ce55628ab2a2942be5d231685212d9f3e525fd25c532d5f756a11fb62d60957f1acbcd5837d5b10aefdd1670978ed018ebdc7c025c1920052864004da835a6320d5d261b3f0f2d31681d9332774c96ee856bd3066c0edb4733b701b81e233450f3a3f01182b321e083e0961b133c2addac4e4c9242f3c4656b7765af8b0bf44f150f146c90970a9736d0b6e138095d3964cead540b66913f4e96562f25e576540bb9030268d5ff81fe1a349d3dabe"}, &(0x7f0000001640)={0x0, 0xa, 0x1, 0x80}, &(0x7f0000001680)={0x0, 0x8, 0x1, 0x3}, &(0x7f00000016c0)={0x20, 0x0, 0x4, {0x3, 0x2}}, &(0x7f0000001700)={0x20, 0x0, 0x4, {0x40, 0x2}}, &(0x7f0000001740)={0x40, 0x7, 0x2, 0x8}, &(0x7f0000001780)={0x40, 0x9, 0x1, 0x4}, &(0x7f00000017c0)={0x40, 0xb, 0x2, "83a1"}, &(0x7f0000001800)={0x40, 0xf, 0x2, 0xffff}, &(0x7f0000001840)={0x40, 0x13, 0x6, @broadcast}, &(0x7f0000001880)={0x40, 0x17, 0x6, @random="158cfa3397e2"}, &(0x7f00000018c0)={0x40, 0x19, 0x2, "62f0"}, &(0x7f0000001900)={0x40, 0x1a, 0x2, 0x101}, &(0x7f0000001940)={0x40, 0x1c, 0x1, 0x1f}, &(0x7f0000001980)={0x40, 0x1e, 0x1, 0x6}, &(0x7f00000019c0)={0x40, 0x21, 0x1, 0x81}}) syz_usb_control_io(r0, &(0x7f0000001c80)={0x18, &(0x7f0000001a80)={0x0, 0x22, 0x23, {0x23, 0x0, "5a92f8b38141b558e75c9b2c9f4694e1255bbd38367be73074315d84ec7354f38d"}}, &(0x7f0000001ac0)={0x0, 0x3, 0xc8, @string={0xc8, 0x3, "ebce5231ab96aaf3176174a57a899891a831b9b676887c42a7ac3a437d9fab5baaa77e268eef7173b5c18789c3deee2fb6a7fae7bf94db35b77c434e4b47c9f103d415fc85b90bf48fba15ad5a93c2505418a6e7f8434038bd7ed9440330604d5517a669b597be2515cff8f12b6254252110e385007e5bad8a2d0c1a823fd3658008ed6e8e7b92927a2d8ce260e637752d0873b1a3fb2e9ca1ed359d63f6c77ce2772dcf4c3992d7282e7ff24d26e2ea0f7bd0b3bc7c68b7b91ec6e549b239836d1edbf7228c"}}, &(0x7f0000001bc0)={0x0, 0xf, 0x37, {0x5, 0xf, 0x37, 0x3, [@ssp_cap={0x1c, 0x10, 0xa, 0x1, 0x4, 0x7, 0x0, 0x9, [0xff3f30, 0xc0, 0xf, 0x30]}, @wireless={0xb, 0x10, 0x1, 0x4, 0x90, 0x0, 0x20, 0x7ff, 0xad}, @wireless={0xb, 0x10, 0x1, 0x4, 0x10, 0x6, 0x7f, 0x0, 0x4}]}}, &(0x7f0000001c00)={0x20, 0x29, 0xf, {0xf, 0x29, 0x40, 0x10, 0x1, 0x1f, "dd0c6568", "fc7a8b59"}}, &(0x7f0000001c40)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x80, 0x0, 0x5a, 0x3, 0xab, 0xfff7, 0x4}}}, &(0x7f0000002140)={0x44, &(0x7f0000001cc0)={0x20, 0xa32095047e21ad97, 0xb1, "539428f3ef088e82268461014908e92fd253a10ae700b8132fd3574524c7a72f706076237882daf729f29b9a71a190f257be0f3e896a4d865fcaff1319e86d6961345f18647c6f22798f2769ad1d443e1c5767ffe0272bb34e8dd7c8e51472286caaf4c6a6ff374d28428490f4b4b925a7e7978152b1c4b116547f4c72a5ed9e9cdac48a19003c979ad8e8c423237fcd551c15332fc88f5ecca5404bff59dec660a6ca9ca7e606890352d64017f94618b1"}, &(0x7f0000001d80)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000001dc0)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000001e00)={0x20, 0x0, 0x4, {0x3, 0x1}}, &(0x7f0000001e40)={0x20, 0x0, 0x4, {0xe0, 0x4}}, &(0x7f0000001e80)={0x40, 0x7, 0x2, 0x5}, &(0x7f0000001ec0)={0x40, 0x9, 0x1, 0x4}, &(0x7f0000001f00)={0x40, 0xb, 0x2, "109f"}, &(0x7f0000001f40)={0x40, 0xf, 0x2, 0x9}, &(0x7f0000001f80)={0x40, 0x13, 0x6}, &(0x7f0000001fc0)={0x40, 0x17, 0x6, @broadcast}, &(0x7f0000002000)={0x40, 0x19, 0x2, "d9d4"}, &(0x7f0000002040)={0x40, 0x1a, 0x2, 0x7}, &(0x7f0000002080)={0x40, 0x1c, 0x1, 0x1f}, &(0x7f00000020c0)={0x40, 0x1e, 0x1, 0x40}, &(0x7f0000002100)={0x40, 0x21, 0x1, 0x85}}) r2 = syz_usb_connect$cdc_ncm(0x1, 0xb5, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xa3, 0x2, 0x1, 0x60, 0x10, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xa, 0x24, 0x6, 0x0, 0x1, "f96cd3f928"}, {0x5, 0x24, 0x0, 0x9}, {0xd, 0x24, 0xf, 0x1, 0x3ff, 0x9, 0xfffb, 0x6}, {0x6, 0x24, 0x1a, 0x2, 0x8}, [@mbim_extended={0x8, 0x24, 0x1c, 0x7fff, 0x5a, 0x4000}, @mdlm={0x15, 0x24, 0x12, 0xf02}, @dmm={0x7, 0x24, 0x14, 0x1, 0x533}, @obex={0x5, 0x24, 0x15, 0x2}, @mdlm={0x15, 0x24, 0x12, 0x8000}, @acm={0x4, 0x24, 0x2, 0x2}]}, {{0x9, 0x5, 0x81, 0x3, 0x20, 0xc0, 0x70, 0x1}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x20, 0x4e, 0x7, 0x1f}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0x3, 0x9, 0xff}}}}}}}]}}, &(0x7f0000000340)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x110, 0x9, 0x3f, 0x2, 0x20, 0x2}, 0x3c, &(0x7f0000000200)={0x5, 0xf, 0x3c, 0x6, [@wireless={0xb, 0x10, 0x1, 0x4, 0x84, 0x5, 0x0, 0xc152, 0x1}, @ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0x4, 0xc, 0x4, 0xfc, 0x8, 0x6}, @ssp_cap={0x18, 0x10, 0xa, 0x5, 0x3, 0x3, 0x0, 0x8, [0xff000f, 0x3f00, 0xcf]}, @ptm_cap={0x3}, @ptm_cap={0x3}]}, 0x3, [{0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x801}}, {0x6e, &(0x7f0000000280)=@string={0x6e, 0x3, "f45feb68ad5749acbc68e4675eb83912d60a3bb9c284a583273a318cdb1b3f9d42f4726e307c8ed5d1bb4dc1d54f01ed9b31aea1211ece8774ad5a027e077d5bdb792d69b32760bf1e4285c0ca004c731e0e18267e5fe6f125dacaaca71a3f60114fc8a43712ed7faec69a35"}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x812}}]}) syz_usb_control_io(r2, &(0x7f0000000540)={0x18, &(0x7f0000000380)={0x40, 0x23, 0xae, {0xae, 0x11, "fff5ea03ea76b669eeac6d64b5cafe0a30347f1cc4810a06bc2f0239464ef7832eb9d6c3df6399f531c4d7932a637b6ecf56a0bca8be2b765f3b284d38bf54e523c26135c4597af2bbabc430c83ba044a68e92cacbe6a11c81ceb838824816b4e12e34f259dfc7cd91c805f398773a8c01fce398e72731262fdef21985e36e8d1c531b0636f807b41eb78ca5fdab2c0c611a2a43d443b07afa73314dcd363362a0c8333de9f1aeb9ec7073ea"}}, &(0x7f0000000440)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0xc5a}}, &(0x7f0000000480)={0x0, 0xf, 0x2e, {0x5, 0xf, 0x2e, 0x3, [@wireless={0xb, 0x10, 0x1, 0x8, 0x40, 0x4, 0x4, 0x1, 0x7}, @ss_container_id={0x14, 0x10, 0x4, 0x1f, "ce5faee309f39c4df49d3986ed199ace"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x1f, 0x8, 0xfff}]}}, &(0x7f00000004c0)={0x20, 0x29, 0xf, {0xf, 0x29, 0x7f, 0x4, 0x1, 0x0, "04c4891d", "ca7d26bd"}}, &(0x7f0000000500)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0xe5, 0x1, 0x8, 0x81, 0x1, 0x2, 0xfffb}}}, &(0x7f0000000a40)={0x44, &(0x7f0000000580)={0x0, 0x30, 0xe6, "0d467e8e6da291d8d757aac129cc0e3278549b114f2e74e9fad52f3dac6e7255f7e72acb02f03295b41c1a4ba505abc481c0dd4fea504974a49f107c939f3bc882732dcf898b79025d7091eabfe9897f946e4a0fb717770addca002ee659739cd3ec609b470073f0defd963b699c5a71d29612d19f0974c08a880ec6c111d92467fa9b72813d902b72dec5579ab6728887dab5cb7cd4022fe51d06f8466411dfa8728d067310b57d7816f4cf755e1e4ed1e9ed51b96d6e59e39c38f7c52e15db05c838ec8d1994a40edbdf4e6824d9fbccdd1cb593e8b859bcc6c2c6044e0658b1ae3c01056e"}, &(0x7f0000000680)={0x0, 0xa, 0x1, 0x9}, &(0x7f00000006c0)={0x0, 0x8, 0x1, 0x4}, &(0x7f0000000700)={0x20, 0x0, 0x4, {0x6, 0x3}}, &(0x7f0000000740)={0x20, 0x0, 0x8, {0x160, 0x8, [0xff]}}, &(0x7f0000000780)={0x40, 0x7, 0x2, 0x5}, &(0x7f00000007c0)={0x40, 0x9, 0x1, 0x72}, &(0x7f0000000800)={0x40, 0xb, 0x2, "8679"}, &(0x7f0000000840)={0x40, 0xf, 0x2, 0x3}, &(0x7f0000000880)={0x40, 0x13, 0x6, @remote}, &(0x7f00000008c0)={0x40, 0x17, 0x6, @random="603103cd760c"}, &(0x7f0000000900)={0x40, 0x19, 0x2, "75e6"}, &(0x7f0000000940)={0x40, 0x1a, 0x2, 0x1000}, &(0x7f0000000980)={0x40, 0x1c, 0x1, 0x7}, &(0x7f00000009c0)={0x40, 0x1e, 0x1, 0x8}, &(0x7f0000000a00)={0x40, 0x21, 0x1, 0x6}}) [ 209.862874][ T1465] Bluetooth: hci1: command 0x0419 tx timeout 11:57:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x20}, {0x14}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) pipe(&(0x7f0000000040)) [ 210.313389][ T7] usb 2-1: new full-speed USB device number 2 using dummy_hcd 11:57:31 executing program 0: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000100)={@rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005600000095000000ae9ffb543d3300000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_mark_inode_dirty\x00'}, 0x10) [ 210.506341][ T7] usb 2-1: device descriptor read/64, error 18 [ 210.783696][ T7] usb 2-1: new full-speed USB device number 3 using dummy_hcd 11:57:31 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="b0000000000000f6"], 0xb0) mount$9p_fd(0x0, &(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000c40)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) [ 210.984701][ T7] usb 2-1: device descriptor read/64, error 18 [ 211.104537][ T7] usb usb2-port1: attempt power cycle 11:57:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@any, 0x4e, 0x1, 0x71}) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x1}]}}}]}, 0x3c}}, 0x0) [ 211.522533][ T7] usb 2-1: new full-speed USB device number 4 using dummy_hcd [ 211.694443][ T7] usb 2-1: device descriptor read/8, error -61 11:57:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={@any, 0x4e, 0x1, 0x71}) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x2c, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x1}]}}}]}, 0x3c}}, 0x0) [ 211.963022][ T7] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 212.134063][ T7] usb 2-1: device descriptor read/8, error -61 11:57:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) open(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r7}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) recvmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000080)}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000500)=""/58, 0x3a}, {&(0x7f0000000540)=""/234, 0xea}, {&(0x7f0000000640)=""/210, 0xd2}, {&(0x7f0000000740)=""/168, 0xa8}], 0x7, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x40000040) ioctl$VFAT_IOCTL_READDIR_BOTH(r8, 0x82187201, &(0x7f00000008c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) [ 212.253571][ T7] usb usb2-port1: unable to enumerate USB device [ 212.514484][ T7269] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 212.588474][ T7271] device ip6gretap0 entered promiscuous mode [ 212.624318][ T7271] device ipvlan0 entered promiscuous mode [ 212.633752][ T7271] device ipvlan0 left promiscuous mode [ 212.673168][ T7271] device ip6gretap0 left promiscuous mode [ 212.872860][ T7271] device ip6gretap0 entered promiscuous mode [ 212.937608][ T7271] device ipvlan0 entered promiscuous mode [ 212.946918][ T7271] device ipvlan0 left promiscuous mode [ 213.016916][ T7271] device ip6gretap0 left promiscuous mode 11:57:33 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0xd4, 0x58, 0xe5, 0x10, 0x1235, 0xa, 0xa8d8, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xdd, 0x4d, 0x58, 0x0, [], [{{0x9, 0x5, 0x1, 0x3, 0x20}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, &(0x7f0000000200)={0x18, 0x0, &(0x7f00000000c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x5f}}, 0x0, 0x0, 0x0}, 0x0) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x6, 0xa4, 0x1c, 0x8, 0xac8, 0x323, 0x19ed, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xfd, 0x16, 0x27}}]}}]}}, 0x0) syz_usb_control_io(r1, 0x0, &(0x7f0000000740)={0x84, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000a80)={0x18, &(0x7f0000000380)={0x20, 0x11, 0xd2, {0xd2, 0x6, "5c071acf8cb6e1133be45ac1a81022bf74a491758ac4ad4fefd5be5f799b25b64c43a5158f24fb030e8db862410e0ccf3031728c049dd2810a36901c083a4f45b6e67ed46ba0fdef42b57dea8f4bff4a498a7a6299bc887e091e22f92e61a3fb88e294d2c6da0f26ee26b7de5f92157698a5bf26685eb73ec2fc84a2b96e7f5252c2617847effaa21ec93c245fee1dc035beedb8e3d3a823cd042767a18ed5505363705b717e0183d29ae5fb492b49de05a0a0833935840173cc47d7883eee226a0e59a4ac0e0934fba261b6c2940225"}}, &(0x7f0000000000)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x200a}}, &(0x7f00000002c0)={0x0, 0xf, 0x1b, {0x5, 0xf, 0x1b, 0x2, [@wireless={0xb, 0x10, 0x1, 0x2, 0x0, 0x4, 0x1, 0x3, 0xfd}, @wireless={0xb, 0x10, 0x1, 0xc, 0x18, 0x3f, 0x8, 0x80, 0xc3}]}}, &(0x7f0000000a00)={0x20, 0x29, 0xf, {0xf, 0x29, 0x9, 0x80, 0x7, 0x80, '{Y=M', "9e377130"}}, &(0x7f0000000a40)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x8, 0x2, 0xcf, 0x0, 0x40, 0x7, 0xfffb}}}, &(0x7f0000000f00)={0x44, &(0x7f0000001e80)=ANY=[@ANYBLOB="00011300000078985aec5c526307f004f584110c0cf25569a9f08348cde894dd7ffbac349ba1b6efdf56bdce30ad4d13bcd318875e8babf249d16bc32db6426c036a27bc58b4b09556cd5bc1c48301740c0af02976d640ee0ccfcfe6ac0b67b24c2d0fde7976e457262a69e4412db39b6171329deecfb56b2b088fa5c682f9b399b75cf72f5e7f70ce1bb4c68058ddb3269228c9e9b902637af87e7f8ababfe84c0c6df64d8234fa9388ca9529ca6e9fcfad29f78dd85c80e899eb9bb6974719cfe774c6455b0053d8d4c804db0b78a0b74635d418903b0efbfd9eaea5ad475f9f5930ccb6"], &(0x7f0000000b40)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000b80)={0x0, 0x8, 0x1}, &(0x7f0000000bc0)={0x20, 0x0, 0x4, {0x1}}, &(0x7f0000000c00)={0x20, 0x0, 0x8, {0x0, 0x10, [0xff00]}}, &(0x7f0000000c40)={0x40, 0x7, 0x2, 0xff57}, &(0x7f0000000c80)={0x40, 0x9, 0x1, 0x6}, &(0x7f0000000cc0)={0x40, 0xb, 0x2, '/X'}, &(0x7f0000000d00)={0x40, 0xf, 0x2, 0xa000}, &(0x7f0000000d40)={0x40, 0x13, 0x6, @remote}, &(0x7f0000000d80)={0x40, 0x17, 0x6, @multicast}, &(0x7f0000000dc0)={0x40, 0x19, 0x2, "c585"}, &(0x7f0000000e00)={0x40, 0x1a, 0x2}, &(0x7f0000000e40)={0x40, 0x1c, 0x1, 0x1}, &(0x7f0000000e80)={0x40, 0x1e, 0x1, 0xff}, &(0x7f0000000ec0)={0x40, 0x21, 0x1, 0x8d}}) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r1, 0x0, &(0x7f0000000ac0)={0x10, &(0x7f00000009c0), 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) r2 = syz_usb_connect$uac1(0x1, 0xf5, &(0x7f0000000f80)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xe3, 0x3, 0x1, 0x6, 0x20, 0x20, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x8001}, [@processing_unit={0xc, 0x24, 0x7, 0x1, 0x1, 0x61, "674e3e250f"}, @output_terminal={0x9, 0x24, 0x3, 0x3, 0x300, 0x3, 0x6, 0xee}, @input_terminal={0xc, 0x24, 0x2, 0x3, 0x204, 0x5, 0xff, 0x5, 0x6, 0x5}, @input_terminal={0xc, 0x24, 0x2, 0x4, 0x200, 0x5, 0x3, 0x7f, 0xf8, 0x4}, @processing_unit={0xd, 0x24, 0x7, 0x4, 0x2, 0x16, "e956ef7e4f29"}, @output_terminal={0x9, 0x24, 0x3, 0x1, 0x300, 0x2, 0x3, 0x2}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xb, 0x24, 0x2, 0x2, 0x4, 0x33, 0x42, "94af"}, @as_header={0x7, 0x24, 0x1, 0x9, 0x1, 0x1002}]}, {{0x9, 0x5, 0x1, 0x9, 0x200, 0x4, 0x5, 0x8, {0x7, 0x25, 0x1, 0x81, 0x1, 0x40}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xf, 0x24, 0x2, 0x2, 0xfffd, 0x3, 0x9, "bacea9fbae35"}, @format_type_ii_discrete={0xc, 0x24, 0x2, 0x2, 0x2, 0x9, 0x20, "ee0595"}, @format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x2, 0x1, 0xcd, 0x3, "6a95", "46ba"}, @format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x20, 0x2, 0x1, 0x6}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x6, 0x6, 0x84, {0x7, 0x25, 0x1, 0x1, 0x4, 0x4}}}}}}}]}}, &(0x7f0000001240)={0xa, &(0x7f0000001080)={0xa, 0x6, 0x110, 0x6, 0x2, 0x55, 0x10, 0x3f}, 0xcf, &(0x7f00000010c0)={0x5, 0xf, 0xcf, 0x1, [@generic={0xca, 0x10, 0x1, "0b4cd5dacb7f301b09dc3261f237e594f9770440b29a623d6cb15035fdcc8b5a9a8c23a404de0360867e1b0c0b4ff074fb188a950c936b6cd5e3c5c2bdb89e39f575a5cd257af62220580ee00e28a29be979a33fcda718224278c65ee9bd7a8b74c3d5b8d6220827700c40cbb534654b9201fbf26abc6eed44b24a61a5594069768c172cd3b734a8b9f852dc2c82fa23693a2c276170917df08b56c4b352f587c9edfe05c24d18a2f95eb347f4f96eb6ec38768348e62fffdc142615899431219436e9c3368db8"}]}, 0x2, [{0x23, &(0x7f00000011c0)=@string={0x23, 0x3, "16bac236ab2c9f58f2b2d92d25f8f65ff00197f8329a475670ede3f048aec3f9f6"}}, {0x4, &(0x7f0000001200)=@lang_id={0x4, 0x3, 0x1c01}}]}) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, &(0x7f0000001cc0)={0xc, &(0x7f0000001b80)={0x20, 0x3, 0xcc, {0xcc, 0x22, "7d48c5026dd756ce2d539b123f97924170456687fe209c6496d0b17df3635701a271a121b9446c1c7bd8cd833cbb20aae0efa57d04f830fe06fc8f3d947d59210a320892637fc541ea869d63f642726af9470067a71c7af4a75a62aa3f252f1f02fdeadd72e88257f602acab9ace60539159159ed01f20f32ff57f3b0d08257cb09539d6942666f9513554c965088ac1c306d2d655af12d6d5dd27e2944fadf7654789b984fd67929f33c0c7597845dcdfb62b0e892f512b2577c8318140ba4abd1fd71e941ddf3e24d2"}}, &(0x7f0000001c80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001e40)={0x10, &(0x7f0000001d00)={0x40, 0x14, 0x8f, "4d13914083a3018d388151f1abcaa016f5e987dce3e8966a21e9fa6141aeb9d5f92c8035f08675e16a28e213e67e828075021e78f57224447feac6498db6cc935dead4f7e86c88b2e1cee98d407d0ffe51606c1a2c60f7aa0a410b59baeefe7c65655a04f80840892f485ed47721422274ca7f39dec1bc31746f06faea9f0dd95c03027c2e363050937066679874c9"}, &(0x7f0000001dc0)={0x0, 0xa, 0x1, 0x5}, &(0x7f0000001e00)={0x0, 0x8, 0x1, 0x1d}}) syz_usb_control_io(r2, &(0x7f0000001600)={0x18, &(0x7f0000001280)={0x40, 0xa, 0xf3, {0xf3, 0x10, "3f426042625de214b5245e929f9346481c96300d8484b92deb017a81bdc765597142d1dfefcbaecab487f6acba3c80369abefd6a02dff5252572e8b8c58822e50ca5cf2eddab510361c3d88aa6dd590572cfedf0dcbbe3a7e4f45a0dc924096e5d3018d22ef4c656d70ac0f6a4b6375070d979920bfaa664ba8bff8059a02774b74bb52b85f2936af0f3996141de66a942d8c6159f93c7e52495207ba3b6d658578eba6014fbd271a359627d9c655bc940273d27cd186873c7e0b9ae3e311f2629c3f9c55f8091529dead5159efd5c962d824fc987a51820f59e5f60f4945b153eed0f8927989dbc1170fc9db1d60599fa"}}, &(0x7f0000001380)={0x0, 0x3, 0xda, @string={0xda, 0x3, "385c185f4d626079742c6ecdb1059e56e6cf1056c9d5ac33cb125ff2dc584171d3eff9bdbfee2f96a9a2bfd376a4cdacd6b9383ee33bf1190f743efd9d3a4c26de419fb8ba030a13f3d0d9e4b599eeee1a47e9e6de6db641936ebbe6704e5ef8b52e35c3b510703ad6d00ab38187521a2895f81af1279923bf95910134f6d58f7a4472e4150fe618b150da05e60dfe78cf892a7d49b71f92969c1984713022a712ec78d001c203dcc8e04d81a66d2ec1d63fab827eddf62e2b9a2d0f64dd693c6cdfb16e0e96e2e7f75dc53292fa96bb5d1bbe298613efa8"}}, &(0x7f0000001480)={0x0, 0xf, 0xd9, {0x5, 0xf, 0xd9, 0x6, [@ptm_cap={0x3}, @generic={0x5a, 0x10, 0xa, "79175810c26797c354e4c05b0596a477b951b1567c5e481344b05ca2c992fb705865f60c67c33d107e57362d8e774c822ee9e293810eab1632043ebdecd69743c745df8f6e6a763fff4bce0a1b9ef8e8ef1cb0efc68edc"}, @ptm_cap={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x8, "9dbba4c3c2438de217cf2aed25809009"}, @ssp_cap={0x24, 0x10, 0xa, 0x2, 0x6, 0x1, 0xff0f, 0x31d7, [0xffff0f, 0x0, 0xf, 0xff003f, 0xffc0f0, 0x3f3f]}, @generic={0x3c, 0x10, 0x2, "3406904701ff9d88ca46e193d12f9244ea7264b24d193868373ec59ef43c1f18a7bdaae0b4161d60f7f3821ba38d722a7c3edb5837776ca96f"}]}}, &(0x7f0000001580)={0x20, 0x29, 0xf, {0xf, 0x29, 0x0, 0x18, 0x3, 0x3f, "3654d2d6", "3103654e"}}, &(0x7f00000015c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x7, 0x2, 0x3f, 0x40, 0x8, 0xc7c, 0x4}}}, &(0x7f0000001b00)={0x44, &(0x7f0000001640)={0x20, 0x31, 0xe4, "7f2f6ead8f6599e9b1a3559ed212421c7d4f2c434d72e2f182f809042923ae779e8e7b5cfec5494ddc29edb2c68d736a447f300627128285eb4d5842c5dddf8eb2e2c57f527aaf8dc8fe73bc2d759d2d4aa1c5f9e7866c9ce340372930c4715ed7073a87dcda7fec51d4b03389b237114791a3e1376661cbe2752dedee31c2c49c52a761d4262d2a6bc0952f8aff3db6234c74042900814bcaff69136d1d4cc316c4c64996f175ca724ab236e56824a5c3b679ebfa7e00df35ff57b92a16f798452a61953db7752b2393c702c43cac0d00c554eca56369b8e853c5f636f7483ce0adb1c0"}, &(0x7f0000001740)={0x0, 0xa, 0x1, 0x2f}, &(0x7f0000001780)={0x0, 0x8, 0x1, 0x8}, &(0x7f00000017c0)={0x20, 0x0, 0x4, {0x1, 0x2}}, &(0x7f0000001800)={0x20, 0x0, 0x4, {0x60, 0x8}}, &(0x7f0000001840)={0x40, 0x7, 0x2, 0x8}, &(0x7f0000001880)={0x40, 0x9, 0x1, 0x4}, &(0x7f00000018c0)={0x40, 0xb, 0x2, "a551"}, &(0x7f0000001900)={0x40, 0xf, 0x2, 0x32}, &(0x7f0000001940)={0x40, 0x13, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, &(0x7f0000001980)={0x40, 0x17, 0x6, @local}, &(0x7f00000019c0)={0x40, 0x19, 0x2}, &(0x7f0000001a00)={0x40, 0x1a, 0x2, 0x2}, &(0x7f0000001a40)={0x40, 0x1c, 0x1, 0xc1}, &(0x7f0000001a80)={0x40, 0x1e, 0x1, 0x81}, &(0x7f0000001ac0)={0x40, 0x21, 0x1, 0x55}}) syz_usb_control_io(r1, &(0x7f0000000340)={0x18, &(0x7f0000001f80)=ANY=[@ANYBLOB="402296000000960491340887fa60c55e001d3f1e8633dae1e76be019b179011f596be8f5cf509a1b8a8627b9038f3a31b2897cdd2c670c584442f679102cf69c77c3ea0c57a706f83df8995994066154d7252f171e8f3997445f15cb3caf9734c5601ed9dbafd569d2d253c6f5a5895fcb6f8d2f52e89b421bf325738044ebc56cccc9a74781643d16133d3fd386951887850d55826c8a25a10aece8b430e362e266e6739fdddea95b7f324a4ab7755f6744b35b184474c4addc4ec0583c9d2c"], &(0x7f0000000240)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x40b}}, &(0x7f0000000280)={0x0, 0xf, 0x21, {0x5, 0xf, 0x21, 0x1, [@ssp_cap={0x1c, 0x10, 0xa, 0x5, 0x4, 0x0, 0xff0f, 0x8000, [0x7f01f0, 0xff0000, 0x3faf, 0x3fcf]}]}}, &(0x7f0000000040)={0x20, 0x29, 0xf, {0xf, 0x29, 0x2, 0xf2, 0xdd, 0x3, "a390be9e", "385149b2"}}, &(0x7f00000001c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x6, 0x8, 0x3f, 0xc0, 0x0, 0x7ff, 0x3}}}, &(0x7f0000000840)={0x44, &(0x7f00000008c0)={0x40, 0x3, 0xd4, "70313c9cea7a9813fd322001bfe5fb716b281620150b6b8f188d27b89feeb8326c3d55116b16694509232a90614020df347e5b9dd6ae403cb3e52706c7ebbd9d2aa76a4b44b8e39c5f0186cf89d81c32b6e3bcd1ea7595dc96412f6ca8693b64a35e2804b4eb354249d9f68b3cf56223c80783e6a49b843e4af73db1d5ba9ea92632dbcb82acd4b61f3e3148c72ec000de1b4ec61519c4718e66a79485730cf47d1079588a8c885d22cbd50bb461b6ddded1045bae2a386c5e8b396112eb4db2fbd424095de442c308a9f7a387f13b9136b90a1e"}, &(0x7f0000000480)={0x0, 0xa, 0x1, 0x1}, &(0x7f00000004c0)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000000500)={0x20, 0x0, 0x4, {0x2, 0x3}}, &(0x7f0000000540)={0x20, 0x0, 0x8, {0x10, 0x80, [0xff0f]}}, &(0x7f0000000580)={0x40, 0x7, 0x2, 0x401}, &(0x7f00000005c0)={0x40, 0x9, 0x1, 0xf4}, &(0x7f0000000600)={0x40, 0xb, 0x2, "cc0a"}, &(0x7f0000000640)={0x40, 0xf, 0x2, 0x7}, &(0x7f0000000680)={0x40, 0x13, 0x6, @multicast}, &(0x7f00000006c0)={0x40, 0x17, 0x6, @local}, &(0x7f0000000700)={0x40, 0x19, 0x2, 'E5'}, &(0x7f0000000740)={0x40, 0x1a, 0x2, 0xfff}, &(0x7f0000000780)={0x40, 0x1c, 0x1}, &(0x7f00000007c0)={0x40, 0x1e, 0x1}, &(0x7f0000000800)={0x40, 0x21, 0x1, 0x8}}) 11:57:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) open(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r7}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) recvmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000080)}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000500)=""/58, 0x3a}, {&(0x7f0000000540)=""/234, 0xea}, {&(0x7f0000000640)=""/210, 0xd2}, {&(0x7f0000000740)=""/168, 0xa8}], 0x7, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x40000040) ioctl$VFAT_IOCTL_READDIR_BOTH(r8, 0x82187201, &(0x7f00000008c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) [ 213.613850][ T1465] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 213.746840][ T7298] device ip6gretap0 entered promiscuous mode [ 213.791127][ T7298] device ipvlan0 entered promiscuous mode [ 213.800918][ T7298] device ipvlan0 left promiscuous mode [ 213.859138][ T7298] device ip6gretap0 left promiscuous mode [ 213.882130][ T1465] usb 2-1: Using ep0 maxpacket: 16 [ 214.014968][ T1465] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x1 has an invalid bInterval 0, changing to 7 11:57:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) open(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r7}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) recvmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000080)}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000500)=""/58, 0x3a}, {&(0x7f0000000540)=""/234, 0xea}, {&(0x7f0000000640)=""/210, 0xd2}, {&(0x7f0000000740)=""/168, 0xa8}], 0x7, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x40000040) ioctl$VFAT_IOCTL_READDIR_BOTH(r8, 0x82187201, &(0x7f00000008c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) [ 214.206721][ T1465] usb 2-1: New USB device found, idVendor=1235, idProduct=000a, bcdDevice=a8.d8 [ 214.216283][ T1465] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 214.224632][ T1465] usb 2-1: Product: syz [ 214.228918][ T1465] usb 2-1: Manufacturer: syz [ 214.233894][ T1465] usb 2-1: SerialNumber: syz [ 214.287045][ T1465] usb 2-1: config 0 descriptor?? [ 214.462046][ T7313] device ip6gretap0 entered promiscuous mode [ 214.493365][ T7313] device ipvlan0 entered promiscuous mode [ 214.502567][ T7313] device ipvlan0 left promiscuous mode [ 214.526909][ T7313] device ip6gretap0 left promiscuous mode [ 214.768557][ T7293] udc-core: couldn't find an available UDC or it's busy [ 214.775801][ T7293] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 214.819494][ T7293] udc-core: couldn't find an available UDC or it's busy [ 214.826809][ T7293] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 11:57:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) open(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r7}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) recvmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000080)}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000500)=""/58, 0x3a}, {&(0x7f0000000540)=""/234, 0xea}, {&(0x7f0000000640)=""/210, 0xd2}, {&(0x7f0000000740)=""/168, 0xa8}], 0x7, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x40000040) ioctl$VFAT_IOCTL_READDIR_BOTH(r8, 0x82187201, &(0x7f00000008c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) [ 214.994605][ T1465] usb 2-1: USB disconnect, device number 6 [ 215.259832][ T7352] device ip6gretap0 entered promiscuous mode [ 215.304674][ T7352] device ipvlan0 entered promiscuous mode [ 215.314090][ T7352] device ipvlan0 left promiscuous mode [ 215.355815][ T7352] device ip6gretap0 left promiscuous mode [ 215.752370][ T1465] usb 2-1: new high-speed USB device number 7 using dummy_hcd 11:57:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) open(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r7}, @IFLA_HSR_SLAVE1={0x8, 0x1, r5}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) recvmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000300)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000080)}, {&(0x7f0000000440)=""/146, 0x92}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000500)=""/58, 0x3a}, {&(0x7f0000000540)=""/234, 0xea}, {&(0x7f0000000640)=""/210, 0xd2}, {&(0x7f0000000740)=""/168, 0xa8}], 0x7, &(0x7f0000000840)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x40000040) [ 216.016442][ T1465] usb 2-1: Using ep0 maxpacket: 16 [ 216.105185][ T7369] device ip6gretap0 entered promiscuous mode [ 216.144584][ T7369] device ipvlan0 entered promiscuous mode [ 216.154033][ T7369] device ipvlan0 left promiscuous mode [ 216.163601][ T1465] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 216.187149][ T7369] device ip6gretap0 left promiscuous mode 11:57:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) open(0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 216.384602][ T1465] usb 2-1: New USB device found, idVendor=1235, idProduct=000a, bcdDevice=a8.d8 [ 216.395164][ T1465] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 216.403719][ T1465] usb 2-1: Product: syz [ 216.408012][ T1465] usb 2-1: Manufacturer: syz [ 216.412809][ T1465] usb 2-1: SerialNumber: syz [ 216.464180][ T1465] usb 2-1: config 0 descriptor?? 11:57:37 executing program 1: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0xd4, 0x58, 0xe5, 0x10, 0x1235, 0xa, 0xa8d8, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xdd, 0x4d, 0x58, 0x0, [], [{{0x9, 0x5, 0x1, 0x3, 0x20}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, &(0x7f0000000200)={0x18, 0x0, &(0x7f00000000c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x5f}}, 0x0, 0x0, 0x0}, 0x0) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x6, 0xa4, 0x1c, 0x8, 0xac8, 0x323, 0x19ed, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xfd, 0x16, 0x27}}]}}]}}, 0x0) syz_usb_control_io(r1, 0x0, &(0x7f0000000740)={0x84, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000a80)={0x18, &(0x7f0000000380)={0x20, 0x11, 0xd2, {0xd2, 0x6, "5c071acf8cb6e1133be45ac1a81022bf74a491758ac4ad4fefd5be5f799b25b64c43a5158f24fb030e8db862410e0ccf3031728c049dd2810a36901c083a4f45b6e67ed46ba0fdef42b57dea8f4bff4a498a7a6299bc887e091e22f92e61a3fb88e294d2c6da0f26ee26b7de5f92157698a5bf26685eb73ec2fc84a2b96e7f5252c2617847effaa21ec93c245fee1dc035beedb8e3d3a823cd042767a18ed5505363705b717e0183d29ae5fb492b49de05a0a0833935840173cc47d7883eee226a0e59a4ac0e0934fba261b6c2940225"}}, &(0x7f0000000000)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x200a}}, &(0x7f00000002c0)={0x0, 0xf, 0x1b, {0x5, 0xf, 0x1b, 0x2, [@wireless={0xb, 0x10, 0x1, 0x2, 0x0, 0x4, 0x1, 0x3, 0xfd}, @wireless={0xb, 0x10, 0x1, 0xc, 0x18, 0x3f, 0x8, 0x80, 0xc3}]}}, &(0x7f0000000a00)={0x20, 0x29, 0xf, {0xf, 0x29, 0x9, 0x80, 0x7, 0x80, '{Y=M', "9e377130"}}, &(0x7f0000000a40)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x8, 0x2, 0xcf, 0x0, 0x40, 0x7, 0xfffb}}}, &(0x7f0000000f00)={0x44, &(0x7f0000001e80)=ANY=[@ANYBLOB="00011300000078985aec5c526307f004f584110c0cf25569a9f08348cde894dd7ffbac349ba1b6efdf56bdce30ad4d13bcd318875e8babf249d16bc32db6426c036a27bc58b4b09556cd5bc1c48301740c0af02976d640ee0ccfcfe6ac0b67b24c2d0fde7976e457262a69e4412db39b6171329deecfb56b2b088fa5c682f9b399b75cf72f5e7f70ce1bb4c68058ddb3269228c9e9b902637af87e7f8ababfe84c0c6df64d8234fa9388ca9529ca6e9fcfad29f78dd85c80e899eb9bb6974719cfe774c6455b0053d8d4c804db0b78a0b74635d418903b0efbfd9eaea5ad475f9f5930ccb6"], &(0x7f0000000b40)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000b80)={0x0, 0x8, 0x1}, &(0x7f0000000bc0)={0x20, 0x0, 0x4, {0x1}}, &(0x7f0000000c00)={0x20, 0x0, 0x8, {0x0, 0x10, [0xff00]}}, &(0x7f0000000c40)={0x40, 0x7, 0x2, 0xff57}, &(0x7f0000000c80)={0x40, 0x9, 0x1, 0x6}, &(0x7f0000000cc0)={0x40, 0xb, 0x2, '/X'}, &(0x7f0000000d00)={0x40, 0xf, 0x2, 0xa000}, &(0x7f0000000d40)={0x40, 0x13, 0x6, @remote}, &(0x7f0000000d80)={0x40, 0x17, 0x6, @multicast}, &(0x7f0000000dc0)={0x40, 0x19, 0x2, "c585"}, &(0x7f0000000e00)={0x40, 0x1a, 0x2}, &(0x7f0000000e40)={0x40, 0x1c, 0x1, 0x1}, &(0x7f0000000e80)={0x40, 0x1e, 0x1, 0xff}, &(0x7f0000000ec0)={0x40, 0x21, 0x1, 0x8d}}) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r1, 0x0, &(0x7f0000000ac0)={0x10, &(0x7f00000009c0), 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) r2 = syz_usb_connect$uac1(0x1, 0xf5, &(0x7f0000000f80)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xe3, 0x3, 0x1, 0x6, 0x20, 0x20, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x8001}, [@processing_unit={0xc, 0x24, 0x7, 0x1, 0x1, 0x61, "674e3e250f"}, @output_terminal={0x9, 0x24, 0x3, 0x3, 0x300, 0x3, 0x6, 0xee}, @input_terminal={0xc, 0x24, 0x2, 0x3, 0x204, 0x5, 0xff, 0x5, 0x6, 0x5}, @input_terminal={0xc, 0x24, 0x2, 0x4, 0x200, 0x5, 0x3, 0x7f, 0xf8, 0x4}, @processing_unit={0xd, 0x24, 0x7, 0x4, 0x2, 0x16, "e956ef7e4f29"}, @output_terminal={0x9, 0x24, 0x3, 0x1, 0x300, 0x2, 0x3, 0x2}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xb, 0x24, 0x2, 0x2, 0x4, 0x33, 0x42, "94af"}, @as_header={0x7, 0x24, 0x1, 0x9, 0x1, 0x1002}]}, {{0x9, 0x5, 0x1, 0x9, 0x200, 0x4, 0x5, 0x8, {0x7, 0x25, 0x1, 0x81, 0x1, 0x40}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xf, 0x24, 0x2, 0x2, 0xfffd, 0x3, 0x9, "bacea9fbae35"}, @format_type_ii_discrete={0xc, 0x24, 0x2, 0x2, 0x2, 0x9, 0x20, "ee0595"}, @format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x2, 0x1, 0xcd, 0x3, "6a95", "46ba"}, @format_type_i_continuous={0x8, 0x24, 0x2, 0x1, 0x20, 0x2, 0x1, 0x6}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x6, 0x6, 0x84, {0x7, 0x25, 0x1, 0x1, 0x4, 0x4}}}}}}}]}}, &(0x7f0000001240)={0xa, &(0x7f0000001080)={0xa, 0x6, 0x110, 0x6, 0x2, 0x55, 0x10, 0x3f}, 0xcf, &(0x7f00000010c0)={0x5, 0xf, 0xcf, 0x1, [@generic={0xca, 0x10, 0x1, "0b4cd5dacb7f301b09dc3261f237e594f9770440b29a623d6cb15035fdcc8b5a9a8c23a404de0360867e1b0c0b4ff074fb188a950c936b6cd5e3c5c2bdb89e39f575a5cd257af62220580ee00e28a29be979a33fcda718224278c65ee9bd7a8b74c3d5b8d6220827700c40cbb534654b9201fbf26abc6eed44b24a61a5594069768c172cd3b734a8b9f852dc2c82fa23693a2c276170917df08b56c4b352f587c9edfe05c24d18a2f95eb347f4f96eb6ec38768348e62fffdc142615899431219436e9c3368db8"}]}, 0x2, [{0x23, &(0x7f00000011c0)=@string={0x23, 0x3, "16bac236ab2c9f58f2b2d92d25f8f65ff00197f8329a475670ede3f048aec3f9f6"}}, {0x4, &(0x7f0000001200)=@lang_id={0x4, 0x3, 0x1c01}}]}) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, &(0x7f0000001cc0)={0xc, &(0x7f0000001b80)={0x20, 0x3, 0xcc, {0xcc, 0x22, "7d48c5026dd756ce2d539b123f97924170456687fe209c6496d0b17df3635701a271a121b9446c1c7bd8cd833cbb20aae0efa57d04f830fe06fc8f3d947d59210a320892637fc541ea869d63f642726af9470067a71c7af4a75a62aa3f252f1f02fdeadd72e88257f602acab9ace60539159159ed01f20f32ff57f3b0d08257cb09539d6942666f9513554c965088ac1c306d2d655af12d6d5dd27e2944fadf7654789b984fd67929f33c0c7597845dcdfb62b0e892f512b2577c8318140ba4abd1fd71e941ddf3e24d2"}}, &(0x7f0000001c80)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001e40)={0x10, &(0x7f0000001d00)={0x40, 0x14, 0x8f, "4d13914083a3018d388151f1abcaa016f5e987dce3e8966a21e9fa6141aeb9d5f92c8035f08675e16a28e213e67e828075021e78f57224447feac6498db6cc935dead4f7e86c88b2e1cee98d407d0ffe51606c1a2c60f7aa0a410b59baeefe7c65655a04f80840892f485ed47721422274ca7f39dec1bc31746f06faea9f0dd95c03027c2e363050937066679874c9"}, &(0x7f0000001dc0)={0x0, 0xa, 0x1, 0x5}, &(0x7f0000001e00)={0x0, 0x8, 0x1, 0x1d}}) syz_usb_control_io(r2, &(0x7f0000001600)={0x18, &(0x7f0000001280)={0x40, 0xa, 0xf3, {0xf3, 0x10, "3f426042625de214b5245e929f9346481c96300d8484b92deb017a81bdc765597142d1dfefcbaecab487f6acba3c80369abefd6a02dff5252572e8b8c58822e50ca5cf2eddab510361c3d88aa6dd590572cfedf0dcbbe3a7e4f45a0dc924096e5d3018d22ef4c656d70ac0f6a4b6375070d979920bfaa664ba8bff8059a02774b74bb52b85f2936af0f3996141de66a942d8c6159f93c7e52495207ba3b6d658578eba6014fbd271a359627d9c655bc940273d27cd186873c7e0b9ae3e311f2629c3f9c55f8091529dead5159efd5c962d824fc987a51820f59e5f60f4945b153eed0f8927989dbc1170fc9db1d60599fa"}}, &(0x7f0000001380)={0x0, 0x3, 0xda, @string={0xda, 0x3, "385c185f4d626079742c6ecdb1059e56e6cf1056c9d5ac33cb125ff2dc584171d3eff9bdbfee2f96a9a2bfd376a4cdacd6b9383ee33bf1190f743efd9d3a4c26de419fb8ba030a13f3d0d9e4b599eeee1a47e9e6de6db641936ebbe6704e5ef8b52e35c3b510703ad6d00ab38187521a2895f81af1279923bf95910134f6d58f7a4472e4150fe618b150da05e60dfe78cf892a7d49b71f92969c1984713022a712ec78d001c203dcc8e04d81a66d2ec1d63fab827eddf62e2b9a2d0f64dd693c6cdfb16e0e96e2e7f75dc53292fa96bb5d1bbe298613efa8"}}, &(0x7f0000001480)={0x0, 0xf, 0xd9, {0x5, 0xf, 0xd9, 0x6, [@ptm_cap={0x3}, @generic={0x5a, 0x10, 0xa, "79175810c26797c354e4c05b0596a477b951b1567c5e481344b05ca2c992fb705865f60c67c33d107e57362d8e774c822ee9e293810eab1632043ebdecd69743c745df8f6e6a763fff4bce0a1b9ef8e8ef1cb0efc68edc"}, @ptm_cap={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x8, "9dbba4c3c2438de217cf2aed25809009"}, @ssp_cap={0x24, 0x10, 0xa, 0x2, 0x6, 0x1, 0xff0f, 0x31d7, [0xffff0f, 0x0, 0xf, 0xff003f, 0xffc0f0, 0x3f3f]}, @generic={0x3c, 0x10, 0x2, "3406904701ff9d88ca46e193d12f9244ea7264b24d193868373ec59ef43c1f18a7bdaae0b4161d60f7f3821ba38d722a7c3edb5837776ca96f"}]}}, &(0x7f0000001580)={0x20, 0x29, 0xf, {0xf, 0x29, 0x0, 0x18, 0x3, 0x3f, "3654d2d6", "3103654e"}}, &(0x7f00000015c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x7, 0x2, 0x3f, 0x40, 0x8, 0xc7c, 0x4}}}, &(0x7f0000001b00)={0x44, &(0x7f0000001640)={0x20, 0x31, 0xe4, "7f2f6ead8f6599e9b1a3559ed212421c7d4f2c434d72e2f182f809042923ae779e8e7b5cfec5494ddc29edb2c68d736a447f300627128285eb4d5842c5dddf8eb2e2c57f527aaf8dc8fe73bc2d759d2d4aa1c5f9e7866c9ce340372930c4715ed7073a87dcda7fec51d4b03389b237114791a3e1376661cbe2752dedee31c2c49c52a761d4262d2a6bc0952f8aff3db6234c74042900814bcaff69136d1d4cc316c4c64996f175ca724ab236e56824a5c3b679ebfa7e00df35ff57b92a16f798452a61953db7752b2393c702c43cac0d00c554eca56369b8e853c5f636f7483ce0adb1c0"}, &(0x7f0000001740)={0x0, 0xa, 0x1, 0x2f}, &(0x7f0000001780)={0x0, 0x8, 0x1, 0x8}, &(0x7f00000017c0)={0x20, 0x0, 0x4, {0x1, 0x2}}, &(0x7f0000001800)={0x20, 0x0, 0x4, {0x60, 0x8}}, &(0x7f0000001840)={0x40, 0x7, 0x2, 0x8}, &(0x7f0000001880)={0x40, 0x9, 0x1, 0x4}, &(0x7f00000018c0)={0x40, 0xb, 0x2, "a551"}, &(0x7f0000001900)={0x40, 0xf, 0x2, 0x32}, &(0x7f0000001940)={0x40, 0x13, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, &(0x7f0000001980)={0x40, 0x17, 0x6, @local}, &(0x7f00000019c0)={0x40, 0x19, 0x2}, &(0x7f0000001a00)={0x40, 0x1a, 0x2, 0x2}, &(0x7f0000001a40)={0x40, 0x1c, 0x1, 0xc1}, &(0x7f0000001a80)={0x40, 0x1e, 0x1, 0x81}, &(0x7f0000001ac0)={0x40, 0x21, 0x1, 0x55}}) syz_usb_control_io(r1, &(0x7f0000000340)={0x18, &(0x7f0000001f80)=ANY=[@ANYBLOB="402296000000960491340887fa60c55e001d3f1e8633dae1e76be019b179011f596be8f5cf509a1b8a8627b9038f3a31b2897cdd2c670c584442f679102cf69c77c3ea0c57a706f83df8995994066154d7252f171e8f3997445f15cb3caf9734c5601ed9dbafd569d2d253c6f5a5895fcb6f8d2f52e89b421bf325738044ebc56cccc9a74781643d16133d3fd386951887850d55826c8a25a10aece8b430e362e266e6739fdddea95b7f324a4ab7755f6744b35b184474c4addc4ec0583c9d2c"], &(0x7f0000000240)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x40b}}, &(0x7f0000000280)={0x0, 0xf, 0x21, {0x5, 0xf, 0x21, 0x1, [@ssp_cap={0x1c, 0x10, 0xa, 0x5, 0x4, 0x0, 0xff0f, 0x8000, [0x7f01f0, 0xff0000, 0x3faf, 0x3fcf]}]}}, &(0x7f0000000040)={0x20, 0x29, 0xf, {0xf, 0x29, 0x2, 0xf2, 0xdd, 0x3, "a390be9e", "385149b2"}}, &(0x7f00000001c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x6, 0x8, 0x3f, 0xc0, 0x0, 0x7ff, 0x3}}}, &(0x7f0000000840)={0x44, &(0x7f00000008c0)={0x40, 0x3, 0xd4, "70313c9cea7a9813fd322001bfe5fb716b281620150b6b8f188d27b89feeb8326c3d55116b16694509232a90614020df347e5b9dd6ae403cb3e52706c7ebbd9d2aa76a4b44b8e39c5f0186cf89d81c32b6e3bcd1ea7595dc96412f6ca8693b64a35e2804b4eb354249d9f68b3cf56223c80783e6a49b843e4af73db1d5ba9ea92632dbcb82acd4b61f3e3148c72ec000de1b4ec61519c4718e66a79485730cf47d1079588a8c885d22cbd50bb461b6ddded1045bae2a386c5e8b396112eb4db2fbd424095de442c308a9f7a387f13b9136b90a1e"}, &(0x7f0000000480)={0x0, 0xa, 0x1, 0x1}, &(0x7f00000004c0)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000000500)={0x20, 0x0, 0x4, {0x2, 0x3}}, &(0x7f0000000540)={0x20, 0x0, 0x8, {0x10, 0x80, [0xff0f]}}, &(0x7f0000000580)={0x40, 0x7, 0x2, 0x401}, &(0x7f00000005c0)={0x40, 0x9, 0x1, 0xf4}, &(0x7f0000000600)={0x40, 0xb, 0x2, "cc0a"}, &(0x7f0000000640)={0x40, 0xf, 0x2, 0x7}, &(0x7f0000000680)={0x40, 0x13, 0x6, @multicast}, &(0x7f00000006c0)={0x40, 0x17, 0x6, @local}, &(0x7f0000000700)={0x40, 0x19, 0x2, 'E5'}, &(0x7f0000000740)={0x40, 0x1a, 0x2, 0xfff}, &(0x7f0000000780)={0x40, 0x1c, 0x1}, &(0x7f00000007c0)={0x40, 0x1e, 0x1}, &(0x7f0000000800)={0x40, 0x21, 0x1, 0x8}}) [ 216.534185][ T1465] usb 2-1: can't set config #0, error -71 [ 216.566194][ T1465] usb 2-1: USB disconnect, device number 7 [ 216.748906][ T7386] device ip6gretap0 entered promiscuous mode [ 216.804579][ T7386] device ipvlan0 entered promiscuous mode [ 216.829234][ T7386] device ipvlan0 left promiscuous mode [ 216.854285][ T7386] device ip6gretap0 left promiscuous mode 11:57:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 217.282619][ T1465] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 217.485279][ T7403] device ip6gretap0 entered promiscuous mode [ 217.524677][ T7403] device ipvlan0 entered promiscuous mode [ 217.534451][ T7403] device ipvlan0 left promiscuous mode [ 217.535941][ T1465] usb 2-1: Using ep0 maxpacket: 16 [ 217.639171][ T7403] device ip6gretap0 left promiscuous mode [ 217.674436][ T1465] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x1 has an invalid bInterval 0, changing to 7 11:57:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 217.854205][ T1465] usb 2-1: New USB device found, idVendor=1235, idProduct=000a, bcdDevice=a8.d8 [ 217.863964][ T1465] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 217.872323][ T1465] usb 2-1: Product: syz [ 217.876610][ T1465] usb 2-1: Manufacturer: syz [ 217.881329][ T1465] usb 2-1: SerialNumber: syz [ 217.954477][ T1465] usb 2-1: config 0 descriptor?? 11:57:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 218.408995][ T7394] udc-core: couldn't find an available UDC or it's busy [ 218.416341][ T7394] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 218.517801][ T7394] udc-core: couldn't find an available UDC or it's busy [ 218.525102][ T7394] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 218.701693][ T1465] usb 2-1: USB disconnect, device number 8 11:57:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 225.551678][ T7543] chnl_net:caif_netlink_parms(): no params data found [ 226.071542][ T7543] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.080115][ T7543] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.089899][ T7543] device bridge_slave_0 entered promiscuous mode [ 226.136711][ T7543] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.144374][ T7543] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.154353][ T7543] device bridge_slave_1 entered promiscuous mode [ 226.342276][ T7] Bluetooth: hci2: command 0x0409 tx timeout [ 226.358857][ T7543] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 226.413037][ T7543] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 226.526046][ T7543] team0: Port device team_slave_0 added [ 226.551468][ T7543] team0: Port device team_slave_1 added [ 226.910845][ T7543] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.918219][ T7543] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.945084][ T7543] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.080725][ T7543] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.088265][ T7543] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.114620][ T7543] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.494239][ T7543] device hsr_slave_0 entered promiscuous mode [ 227.543597][ T7543] device hsr_slave_1 entered promiscuous mode [ 227.582549][ T7543] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 227.590241][ T7543] Cannot create hsr debugfs directory [ 228.294644][ T7543] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 228.326460][ T7543] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 228.370948][ T7543] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 228.415638][ T7543] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 228.423840][ T7916] Bluetooth: hci2: command 0x041b tx timeout [ 228.906072][ T7543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.955873][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.965498][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.996718][ T7543] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.029328][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.040259][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.050326][ T7916] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.057874][ T7916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.128208][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.138015][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.149286][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.159248][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.166696][ T7916] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.176032][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.187747][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.211058][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.222704][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.252809][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.289309][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.302267][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.361047][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.371256][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.426952][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.437328][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.450831][ T7543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.577273][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.585526][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.654460][ T7543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.746816][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.758029][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.841510][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.852389][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.880499][ T7543] device veth0_vlan entered promiscuous mode [ 229.889960][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.901047][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.952965][ T7543] device veth1_vlan entered promiscuous mode [ 230.054768][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.065250][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 230.075231][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.085654][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.121409][ T7543] device veth0_macvtap entered promiscuous mode [ 230.148483][ T7543] device veth1_macvtap entered promiscuous mode [ 230.229317][ T7543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 230.240775][ T7543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.251049][ T7543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 230.261768][ T7543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.276272][ T7543] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 230.288393][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 230.298552][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.308803][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.319354][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.358422][ T7543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 230.369944][ T7543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.380096][ T7543] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 230.390861][ T7543] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.405117][ T7543] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 230.414641][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.425150][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.460598][ T7543] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.469897][ T7543] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.479432][ T7543] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.488515][ T7543] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 230.504497][ T7916] Bluetooth: hci2: command 0x040f tx timeout [ 231.292988][ T152] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 231.300937][ T152] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 231.312707][ T1465] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 231.415860][ T152] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 231.423914][ T152] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 231.441505][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 11:57:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 232.080337][ T7965] device syz_tun entered promiscuous mode [ 232.154518][ T7965] device ipvlan0 entered promiscuous mode [ 232.166875][ T7965] device ipvlan0 left promiscuous mode [ 232.248139][ T7965] device syz_tun left promiscuous mode 11:57:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 232.585115][ T7916] Bluetooth: hci2: command 0x0419 tx timeout [ 232.791391][ T7988] device syz_tun entered promiscuous mode [ 232.847186][ T7988] device ipvlan0 entered promiscuous mode [ 232.856499][ T7988] device ipvlan0 left promiscuous mode 11:57:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 232.906655][ T7988] device syz_tun left promiscuous mode 11:57:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 233.608843][ T8009] device syz_tun entered promiscuous mode [ 233.659560][ T8009] device ipvlan0 entered promiscuous mode [ 233.668915][ T8009] device ipvlan0 left promiscuous mode [ 233.715944][ T8009] device syz_tun left promiscuous mode 11:57:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 234.399089][ T8030] device syz_tun entered promiscuous mode [ 234.471107][ T8030] device ipvlan0 entered promiscuous mode [ 234.480358][ T8030] device ipvlan0 left promiscuous mode [ 234.522000][ C1] hrtimer: interrupt took 222703 ns [ 234.538041][ T8030] device syz_tun left promiscuous mode 11:57:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 235.283606][ T8059] device syz_tun entered promiscuous mode [ 235.366789][ T8059] device ipvlan0 entered promiscuous mode [ 235.376293][ T8059] device ipvlan0 left promiscuous mode 11:57:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 235.458073][ T8059] device syz_tun left promiscuous mode 11:57:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 236.024373][ T8081] device syz_tun entered promiscuous mode 11:57:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 236.066312][ T8081] device ipvlan0 entered promiscuous mode [ 236.076306][ T8081] device ipvlan0 left promiscuous mode [ 236.097413][ T8081] device syz_tun left promiscuous mode 11:57:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:57 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:58 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 238.487328][ T8143] device syz_tun entered promiscuous mode [ 238.520901][ T8143] device ipvlan0 entered promiscuous mode [ 238.530193][ T8143] device ipvlan0 left promiscuous mode [ 238.566708][ T8143] device syz_tun left promiscuous mode 11:57:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:57:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 239.149135][ T8162] device syz_tun entered promiscuous mode [ 239.208768][ T8162] device ipvlan0 entered promiscuous mode [ 239.218214][ T8162] device ipvlan0 left promiscuous mode 11:57:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 239.309563][ T8162] device syz_tun left promiscuous mode 11:58:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 240.034617][ T8183] device syz_tun entered promiscuous mode [ 240.100731][ T8183] device ipvlan0 entered promiscuous mode [ 240.110072][ T8183] device ipvlan0 left promiscuous mode [ 240.188565][ T8183] device syz_tun left promiscuous mode 11:58:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:01 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 240.867018][ T8203] device syz_tun entered promiscuous mode [ 240.913233][ T8203] device ipvlan0 entered promiscuous mode [ 240.922634][ T8203] device ipvlan0 left promiscuous mode 11:58:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 240.996322][ T8203] device syz_tun left promiscuous mode 11:58:01 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 241.753650][ T8221] device syz_tun entered promiscuous mode [ 241.791050][ T8221] device ipvlan0 entered promiscuous mode [ 241.800395][ T8221] device ipvlan0 left promiscuous mode [ 241.872654][ T8221] device syz_tun left promiscuous mode 11:58:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:02 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 242.587801][ T8238] device syz_tun entered promiscuous mode [ 242.630469][ T8238] device ipvlan0 entered promiscuous mode [ 242.639919][ T8238] device ipvlan0 left promiscuous mode [ 242.715728][ T8238] device syz_tun left promiscuous mode 11:58:03 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:03 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:04 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 243.431819][ T8256] device syz_tun entered promiscuous mode [ 243.504963][ T8256] device ipvlan0 entered promiscuous mode [ 243.514134][ T8256] device ipvlan0 left promiscuous mode 11:58:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 243.566054][ T8256] device syz_tun left promiscuous mode 11:58:04 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 11:58:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 244.210645][ T8269] device syz_tun entered promiscuous mode [ 244.277739][ T8269] device ipvlan0 entered promiscuous mode [ 244.287152][ T8269] device ipvlan0 left promiscuous mode 11:58:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 244.359054][ T8269] device syz_tun left promiscuous mode 11:58:05 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 244.998131][ T8283] device syz_tun entered promiscuous mode [ 245.031007][ T8283] device ipvlan0 entered promiscuous mode [ 245.040522][ T8283] device ipvlan0 left promiscuous mode [ 245.085223][ T8283] device syz_tun left promiscuous mode 11:58:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 245.724551][ T8296] device syz_tun entered promiscuous mode [ 245.739564][ T8296] device ipvlan0 entered promiscuous mode [ 245.748840][ T8296] device ipvlan0 left promiscuous mode [ 245.757407][ T8296] device syz_tun left promiscuous mode 11:58:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:58:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, 0x0, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 246.382904][ T8311] device syz_tun entered promiscuous mode [ 246.424873][ T8311] device ipvlan0 entered promiscuous mode [ 246.434455][ T8311] device ipvlan0 left promiscuous mode [ 246.454733][ T8311] device syz_tun left promiscuous mode 11:58:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:58:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 247.131566][ T8329] device syz_tun entered promiscuous mode [ 247.173263][ T8329] device ipvlan0 entered promiscuous mode [ 247.182626][ T8329] device ipvlan0 left promiscuous mode 11:58:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) [ 247.265065][ T8329] device syz_tun left promiscuous mode 11:58:08 executing program 0: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 11:58:08 executing program 1: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:08 executing program 0: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 11:58:09 executing program 1: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:09 executing program 0: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:09 executing program 1: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 11:58:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:10 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 11:58:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1ec, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}]}, 0x1ec}}, 0x0) 11:58:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 11:58:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1dc, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}]}, 0x1dc}}, 0x0) 11:58:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:58:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}]}, 0x48}}, 0x0) 11:58:12 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 252.161624][ T8424] device syz_tun entered promiscuous mode [ 252.208732][ T8424] device ipvlan0 entered promiscuous mode [ 252.218718][ T8424] device ipvlan0 left promiscuous mode [ 252.250836][ T8424] device syz_tun left promiscuous mode [ 253.688883][ T8421] chnl_net:caif_netlink_parms(): no params data found [ 254.146463][ T8421] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.153972][ T8421] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.163839][ T8421] device bridge_slave_0 entered promiscuous mode [ 254.189847][ T8421] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.198424][ T8421] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.208433][ T8421] device bridge_slave_1 entered promiscuous mode [ 254.368261][ T8421] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.425837][ T8421] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.597247][ T8421] team0: Port device team_slave_0 added [ 254.630485][ T8421] team0: Port device team_slave_1 added [ 254.788106][ T8421] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 254.798641][ T8421] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.826050][ T8421] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 254.903821][ T8421] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 254.910880][ T8421] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.937264][ T8421] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.066966][ T7] Bluetooth: hci3: command 0x0409 tx timeout [ 255.225493][ T8421] device hsr_slave_0 entered promiscuous mode [ 255.277926][ T8421] device hsr_slave_1 entered promiscuous mode [ 255.332544][ T8421] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.340224][ T8421] Cannot create hsr debugfs directory [ 256.787762][ T8421] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 256.897128][ T8421] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 256.960245][ T8421] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 257.017283][ T8421] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 257.142691][ T2793] Bluetooth: hci3: command 0x041b tx timeout [ 257.905855][ T8421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.037894][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.047611][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.090048][ T8421] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.156348][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.167007][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.179597][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.187134][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.276232][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.286041][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.296694][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.306565][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.314068][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.323627][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 258.421013][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 258.433529][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 258.444969][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.456063][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 258.468572][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.482651][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 258.492912][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.529326][ T8421] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 258.543214][ T8421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 258.636787][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 258.647603][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 258.657865][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.667968][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 258.675923][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.705219][ T8421] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 258.828850][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 258.840159][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.970252][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 258.983017][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.010975][ T8421] device veth0_vlan entered promiscuous mode [ 259.025964][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.035677][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.089478][ T8421] device veth1_vlan entered promiscuous mode [ 259.223179][ T30] Bluetooth: hci3: command 0x040f tx timeout [ 259.244569][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 259.255610][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.284258][ T8421] device veth0_macvtap entered promiscuous mode [ 259.328094][ T8421] device veth1_macvtap entered promiscuous mode [ 259.395487][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.409427][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.420389][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.431041][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.441177][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.451877][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.466324][ T8421] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 259.484406][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 259.494413][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 259.506791][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 259.517425][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.551599][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.562388][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.572796][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.583521][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.593691][ T8421] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.607162][ T8421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.621753][ T8421] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 259.638530][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 259.649296][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.682072][ T8421] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.690989][ T8421] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.700204][ T8421] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 259.712232][ T8421] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.887157][ T151] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 260.895509][ T151] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 260.910854][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 261.100846][ T1022] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 261.109036][ T1022] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 261.121105][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 261.305194][ T1465] Bluetooth: hci3: command 0x0419 tx timeout 11:58:22 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:58:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 11:58:22 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 262.050810][ T8811] device syz_tun entered promiscuous mode [ 262.131206][ T8811] device ipvlan0 entered promiscuous mode [ 262.140670][ T8811] device ipvlan0 left promiscuous mode [ 262.228788][ T8811] device syz_tun left promiscuous mode 11:58:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 11:58:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 11:58:23 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:23 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) [ 263.050126][ T8829] device syz_tun entered promiscuous mode 11:58:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) [ 263.115601][ T8829] device ipvlan0 entered promiscuous mode [ 263.124984][ T8829] device ipvlan0 left promiscuous mode [ 263.185401][ T8829] device syz_tun left promiscuous mode 11:58:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 11:58:24 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) [ 264.045906][ T8853] device syz_tun entered promiscuous mode [ 264.127692][ T8853] device ipvlan0 entered promiscuous mode [ 264.136846][ T8853] device ipvlan0 left promiscuous mode [ 264.224493][ T8853] device syz_tun left promiscuous mode 11:58:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:25 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x38}}, 0x0) 11:58:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:25 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x38}}, 0x0) [ 265.156076][ T8876] device syz_tun entered promiscuous mode [ 265.241328][ T8876] device ipvlan0 entered promiscuous mode [ 265.250629][ T8876] device ipvlan0 left promiscuous mode [ 265.322419][ T8876] device syz_tun left promiscuous mode 11:58:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:26 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x38}}, 0x0) 11:58:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 266.223701][ T8897] device syz_tun entered promiscuous mode [ 266.278005][ T8897] device ipvlan0 entered promiscuous mode [ 266.287402][ T8897] device ipvlan0 left promiscuous mode [ 266.307605][ T8897] device syz_tun left promiscuous mode 11:58:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x38}}, 0x0) 11:58:27 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1ec, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}]}, 0x1ec}}, 0x0) [ 267.042710][ T8912] device syz_tun entered promiscuous mode [ 267.067015][ T8912] device ipvlan0 entered promiscuous mode [ 267.076708][ T8912] device ipvlan0 left promiscuous mode [ 267.241623][ T8912] device syz_tun left promiscuous mode 11:58:28 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1dc, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}]}, 0x1dc}}, 0x0) 11:58:28 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 268.149617][ T8934] device syz_tun entered promiscuous mode 11:58:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}]}, 0x48}}, 0x0) [ 268.219588][ T8934] device ipvlan0 entered promiscuous mode [ 268.228946][ T8934] device ipvlan0 left promiscuous mode 11:58:29 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 268.323454][ T8934] device syz_tun left promiscuous mode 11:58:29 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:29 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}]}, 0x40}}, 0x0) [ 269.166256][ T8950] device syz_tun entered promiscuous mode [ 269.235252][ T1266] ieee802154 phy0 wpan0: encryption failed: -22 [ 269.241762][ T1266] ieee802154 phy1 wpan1: encryption failed: -22 [ 269.245344][ T8950] device ipvlan0 entered promiscuous mode [ 269.257537][ T8950] device ipvlan0 left promiscuous mode [ 269.351783][ T8950] device syz_tun left promiscuous mode 11:58:30 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:30 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 11:58:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 11:58:30 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:30 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 11:58:31 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:31 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r1}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_SLAVE1={0x8, 0x1, r4}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x38}}, 0x0) 11:58:32 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:32 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r1}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x38}}, 0x0) 11:58:32 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r1}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:32 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r3}, @IFLA_HSR_SLAVE1={0x8, 0x1, r1}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}]}}}]}, 0x38}}, 0x0) 11:58:33 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r1}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:33 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 11:58:34 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r1}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:34 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 11:58:34 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:34 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x40}}, 0x0) 11:58:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:35 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:35 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) 11:58:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:35 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:36 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) 11:58:36 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) 11:58:37 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:37 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:37 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) 11:58:37 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:38 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) 11:58:38 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r4}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, 0x0, &(0x7f0000000000)) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:38 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r2}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}]}, 0x38}}, 0x0) 11:58:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r5}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) [ 278.502089][ T8421] ===================================================== [ 278.509215][ T8421] BUG: KMSAN: uninit-value in number+0xd27/0x24c0 [ 278.515674][ T8421] number+0xd27/0x24c0 [ 278.519779][ T8421] vsnprintf+0x1f3a/0x36a0 [ 278.524266][ T8421] snprintf+0x244/0x290 [ 278.528451][ T8421] tomoyo_init_log+0xd39/0x3b50 [ 278.533409][ T8421] tomoyo_supervisor+0x8bd/0x2820 [ 278.538473][ T8421] tomoyo_path_perm+0x96c/0xc70 [ 278.543364][ T8421] tomoyo_inode_getattr+0x54/0x60 [ 278.548512][ T8421] security_inode_getattr+0x1bf/0x2a0 [ 278.553995][ T8421] vfs_fstat+0xe6/0x280 [ 278.558241][ T8421] __ia32_compat_sys_ia32_fstat64+0xdd/0x1d0 [ 278.564313][ T8421] __do_fast_syscall_32+0x96/0xf0 [ 278.569425][ T8421] do_fast_syscall_32+0x34/0x70 [ 278.574322][ T8421] do_SYSENTER_32+0x1b/0x20 [ 278.578867][ T8421] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 278.585291][ T8421] [ 278.587620][ T8421] Local variable pvec created at: [ 278.592648][ T8421] truncate_inode_pages_range+0x95/0x2720 [ 278.598544][ T8421] truncate_inode_pages_final+0xf3/0x150 [ 278.604215][ T8421] ===================================================== [ 278.611149][ T8421] Disabling lock debugging due to kernel taint [ 278.620661][ T8421] Kernel panic - not syncing: panic_on_kmsan set ... [ 278.627359][ T8421] CPU: 1 PID: 8421 Comm: syz-executor.3 Tainted: G B 5.15.0-syzkaller #0 [ 278.637114][ T8421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.647196][ T8421] Call Trace: [ 278.650489][ T8421] dump_stack_lvl+0x1ff/0x28e [ 278.655224][ T8421] dump_stack+0x25/0x28 [ 278.659418][ T8421] panic+0x44f/0xdeb [ 278.663430][ T8421] ? add_taint+0x187/0x210 [ 278.667955][ T8421] ? add_taint+0x187/0x210 [ 278.672426][ T8421] kmsan_report+0x2e9/0x2f0 [ 278.676968][ T8421] ? update_stack_state+0xa39/0xc00 [ 278.682330][ T8421] ? __msan_warning+0xb4/0x100 [ 278.687149][ T8421] ? number+0xd27/0x24c0 [ 278.691454][ T8421] ? vsnprintf+0x1f3a/0x36a0 [ 278.696251][ T8421] ? snprintf+0x244/0x290 [ 278.700766][ T8421] ? tomoyo_init_log+0xd39/0x3b50 [ 278.705864][ T8421] ? tomoyo_supervisor+0x8bd/0x2820 [ 278.711101][ T8421] ? tomoyo_path_perm+0x96c/0xc70 [ 278.716185][ T8421] ? tomoyo_inode_getattr+0x54/0x60 [ 278.721437][ T8421] ? security_inode_getattr+0x1bf/0x2a0 [ 278.727029][ T8421] ? vfs_fstat+0xe6/0x280 [ 278.731395][ T8421] ? __ia32_compat_sys_ia32_fstat64+0xdd/0x1d0 [ 278.737622][ T8421] ? __do_fast_syscall_32+0x96/0xf0 [ 278.742866][ T8421] ? do_fast_syscall_32+0x34/0x70 [ 278.747932][ T8421] ? do_SYSENTER_32+0x1b/0x20 [ 278.752645][ T8421] ? entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 278.759189][ T8421] ? __module_address+0x61/0x630 [ 278.764236][ T8421] ? kmsan_get_metadata+0x11b/0x180 [ 278.769473][ T8421] ? kmsan_get_shadow_origin_ptr+0x97/0xd0 [ 278.775326][ T8421] ? kmsan_get_metadata+0x11b/0x180 [ 278.780567][ T8421] ? kmsan_internal_set_shadow_origin+0x52/0xc0 [ 278.786871][ T8421] __msan_warning+0xb4/0x100 [ 278.791516][ T8421] number+0xd27/0x24c0 [ 278.795634][ T8421] ? kmsan_get_shadow_origin_ptr+0x97/0xd0 [ 278.801480][ T8421] vsnprintf+0x1f3a/0x36a0 [ 278.805949][ T8421] snprintf+0x244/0x290 [ 278.810147][ T8421] ? kmsan_get_shadow_origin_ptr+0x97/0xd0 [ 278.815994][ T8421] ? from_kgid+0x330/0xbe0 [ 278.820508][ T8421] tomoyo_init_log+0xd39/0x3b50 [ 278.825434][ T8421] tomoyo_supervisor+0x8bd/0x2820 [ 278.830514][ T8421] ? tomoyo_check_acl+0x591/0x630 [ 278.835640][ T8421] ? tomoyo_execute_permission+0x5e0/0x5e0 [ 278.841613][ T8421] tomoyo_path_perm+0x96c/0xc70 [ 278.846520][ T8421] ? kmem_cache_free+0xba9/0xe10 [ 278.851523][ T8421] tomoyo_inode_getattr+0x54/0x60 [ 278.856603][ T8421] ? tomoyo_path_rename+0x260/0x260 [ 278.861940][ T8421] security_inode_getattr+0x1bf/0x2a0 [ 278.867366][ T8421] vfs_fstat+0xe6/0x280 [ 278.871571][ T8421] ? __ia32_compat_sys_ia32_fstat64+0xad/0x1d0 [ 278.877775][ T8421] __ia32_compat_sys_ia32_fstat64+0xdd/0x1d0 [ 278.883810][ T8421] ? syscall_enter_from_user_mode_work+0x5c/0x8c0 [ 278.890351][ T8421] ? kmsan_get_shadow_origin_ptr+0x97/0xd0 [ 278.896204][ T8421] ? kmsan_get_metadata+0x11b/0x180 11:58:39 executing program 2: socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x10, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x1f4, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x50}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r3}]}}}, @IFLA_EXT_MASK={0x8, 0x1d, 0xba70}, @IFLA_VF_PORTS={0x194, 0x18, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8a787c6423bff672e335f34ae757d572"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_PROFILE={0x8, 0x2, 'hsr\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "fee252af9029c470ca3516ee759ef035"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "233978017e8741ebe176e70dce9afff1"}, @IFLA_PORT_VF={0x8, 0x1, 0x20}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "39340b550ad324dba6b0eebc918e41e3"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "1897e567fea85accfdef6c393f208685"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b8ee534623d2f04454e4f427b55f88dd"}, @IFLA_PORT_VF={0x8, 0x1, 0x10004}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xa6}, @IFLA_PORT_PROFILE={0xd, 0x2, '/dev/kvm\x00'}, @IFLA_PORT_PROFILE={0x7, 0x2, '\xdd$\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2687f0d71c939eef167517753cab5bb0"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3c8b7e0fcf2fae92554f311a008f3c6b"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c62bb40d57a1a03c2bb999b6351fc808"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "1baccc6c3656c757e50cab4e1b2ba3cb"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4d2e170283a4612e41e967a704f4b807"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c3038c5a1803a8c91c335f6a551b900a"}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ccf793e12b597e3b163780b3568b1f75"}, @IFLA_PORT_VF={0x8, 0x1, 0x4}]}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "346e221c124de1768766eb"}, @IFLA_WEIGHT={0x8, 0xf, 0x5}]}, 0x1f4}}, 0x0) 11:58:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @hsr={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8}]}}}]}, 0x38}}, 0x0) [ 278.901447][ T8421] __do_fast_syscall_32+0x96/0xf0 [ 278.906522][ T8421] do_fast_syscall_32+0x34/0x70 [ 278.911420][ T8421] do_SYSENTER_32+0x1b/0x20 [ 278.915965][ T8421] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 278.922345][ T8421] RIP: 0023:0xf6ec7549 [ 278.926438][ T8421] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 [ 278.946356][ T8421] RSP: 002b:00000000ffdc9b98 EFLAGS: 00000292 ORIG_RAX: 00000000000000c5 [ 278.954817][ T8421] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffdc9bcc [ 278.962843][ T8421] RDX: 0000000000098800 RSI: 0000000000000003 RDI: 00000000ffdc9bcc [ 278.970856][ T8421] RBP: 0000000000000bb8 R08: 0000000000000000 R09: 0000000000000000 [ 278.978859][ T8421] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 278.986946][ T8421] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 278.995032][ T8421] Kernel Offset: disabled [ 278.999361][ T8421] Rebooting in 86400 seconds..